{
    "version" : "https://jsonfeed.org/version/1",
    "content" : "resources",
    "type" : "single",
    "title" : "Deceptive Design: How to Identify and Combat Consequence Design |Digital.gov",
    "description": "Deceptive Design: How to Identify and Combat Consequence Design",
    "home_page_url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/","feed_url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/resources/deceptive-design-how-to-identify-and-combat-consequence-design/index.json","item" : [
    {"title" :"Deceptive Design: How to Identify and Combat Consequence Design","deck" : "","summary" : "Consequence design is part of everyday life. Techniques like “deceptive patterns” and “hostile design” trick people into taking unintended actions — learn how to prevent them from sneaking into our design work.","date" : "2020-12-01T14:10:00-05:00","date_modified" : "2025-01-27T19:42:55-05:00","authors" : {"ron-bronson" : "Ron Bronson"},"topics" : {
        
            "design" : "Design",
            "user-experience" : "User experience"
            },"branch" : "bc-archive-content-3",
      "filename" :"deceptive-design-how-to-identify-and-combat-consequence-design.md",
      
      "filepath" :"resources/deceptive-design-how-to-identify-and-combat-consequence-design.md",
      "filepathURL" :"https://github.com/GSA/digitalgov.gov/blob/bc-archive-content-3/content/resources/deceptive-design-how-to-identify-and-combat-consequence-design.md",
      "editpathURL" :"https://github.com/GSA/digitalgov.gov/edit/bc-archive-content-3/content/resources/deceptive-design-how-to-identify-and-combat-consequence-design.md","slug" : "deceptive-design-how-to-identify-and-combat-consequence-design","url" : "/preview/gsa/digitalgov.gov/bc-archive-content-3/resources/deceptive-design-how-to-identify-and-combat-consequence-design/","weight" : "1","content" :"\n\n\n\n\n\n\u003cdiv\n  class=\"video\"\n  style=\"position: relative; padding-bottom: 56.25%; padding-top: 30px; height: 0; overflow: hidden;\"\n\u003e\n  \n  \u003ciframe src=\"https://www.youtube.com/embed/Aw5ovySXf6o\" title=\"USWDS Monthly Call: Deceptive Design Patterns Dark Patterns (Oct 2020)\" style=\"position: absolute; top: 0; left: 0; width: 100%; height: 100%;\" allowfullscreen=\"\" frameborder=\"0\" \u003e\u003c/iframe\u003e\n\u003c/div\u003e\n\n\n\n\n\u003carticle\n  class=\"dg-note \"\n\u003e\n  \u003ch4 class=\"dg-note__heading\"\u003e\n    \u003csvg\n      class=\"dg-note__icon usa-icon dg-icon dg-icon--large\"\n      aria-hidden=\"true\"\n      focusable=\"false\"\n    \u003e\n      \u003cuse xlink:href=\"/preview/gsa/digitalgov.gov/bc-archive-content-3/uswds/img/sprite.svg#notifications\"\u003e\u003c/use\u003e\n    \u003c/svg\u003e\n    \n      Note\n    \n  \u003c/h4\u003e\n  In this training, Ron Bronson, who leads the product design teams for GSA/TTS 18F team, discusses what we all can do to assure that deceptive design patterns stay out of the sites we build. The article below provides an overview of the presentation.\n\u003c/article\u003e\n\n\u003cp\u003eWe all rely on design to facilitate our user experiences. So, shouldn’t design reflect good intentions and honesty? Unfortunately, this is not always the case. Businesses often employ sneaky techniques to persuade users into buying their product or subscribing to their brand. These techniques are called “deceptive patterns” or “hostile design.” They are user interface tricks that are designed to influence people into doing things they otherwise might not do.\u003c/p\u003e\n\u003cp\u003eThese tricks come in several forms, such as a popup window that demands a new subscription, or a spot designed to look like dirt on your phone screen, so you try to wipe it off and end up clicking a link instead. Even in the non-digital world, we can identify certain deceptive behaviors as “hostile design,” such as sleight of hand or trick questions. Designers, intentionally or unintentionally, can use psychology to mislead and trap users.\u003c/p\u003e\n\n\n\n\n\n\n\u003cdiv class=\"quote-block \"\u003e\n    \u003cblockquote\u003e\n      \u003cspan class=\"quote-block__quotation-mark\"\u003e“\u003c/span\u003e\n      Products are not innocent; they mediate our behavior; how we collaborate, how we interact with our environment and how we deal with social issues.\n      \u003cspan class=\"quote-block__quotation-mark\"\u003e”\u003c/span\u003e\u003ccite\u003e— Alain Dujardin\u003c/cite\u003e\u003c/blockquote\u003e\n  \u003c/div\u003e\n\u003ch2 id=\"what-are-some-common-types-of-hostile-design\"\u003e\u003cstrong\u003eWhat are some common types of hostile design?\u003c/strong\u003e\u003c/h2\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cstrong\u003eDesigner Myopia\u003c/strong\u003e occurs when we design from our own experiences, rather than solving actual problems. It also happens when designers do not consider user needs, and focus on their own preferences or motives.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eAttention Theft\u003c/strong\u003e inundates users with notifications or information trying to catch their attention. If information comes from only one website or Listserv, it’s no problem, but we often receive unsolicited messages from many sources.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eCoercive Friction\u003c/strong\u003e pushes users to make counterintuitive decisions.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eGuilt Friction\u003c/strong\u003e employs design patterns to reinforce guilt as a user retention strategy.\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eCoercive and guilt friction are best explained with an example:\u003c/p\u003e\n\u003cp\u003eCarl is not thinking about a haircut, but suddenly he receives an email from his barber saying, “It’s been a while since your last visit – we miss you!” The barbershop is clearly trying to persuade Carl by targeting the feeling of guilt and questioning whether he needs a haircut or not. At times, users see through these techniques because it’s obvious that the notifications are being sent by a system, not by the actual sender (in this case, Carl’s long-time barber). Regardless, it is easy for a user to fall into a trap when the design has deceptive intentions.\u003c/p\u003e\n\u003ch2 id=\"as-designers-we-can-practice-the-4-rs-to-prevent-hostile-design\"\u003e\u003cstrong\u003eAs designers, we can practice the 4 Rs to prevent hostile design:\u003c/strong\u003e\u003c/h2\u003e\n\u003col\u003e\n\u003cli\u003e\u003cstrong\u003eReconsider\u003c/strong\u003e our own assumptions.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eReframe\u003c/strong\u003e the problem statement with the lens of an “edge case,” or the audience outside our normal or expected view.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eRewrite\u003c/strong\u003e your protocols as needed to mine for information about liminal (or transitional) user experience (UX) states.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eRepeat\u003c/strong\u003e this process.\u003c/li\u003e\n\u003c/ol\u003e\n\u003cp\u003eNow, let’s get more specific.\u003c/p\u003e\n\u003ch2 id=\"what-are-some-practical-methods-we-can-implement-to-make-sure-we-are-following-the-4-rs\"\u003e\u003cstrong\u003eWhat are some practical methods we can implement to make sure we are following the 4 Rs?\u003c/strong\u003e\u003c/h2\u003e\n\u003cul\u003e\n\u003cli\u003e\u003cstrong\u003eDesignated Dissenter\u003c/strong\u003e - A sprint exercise where a designated team member imagines and verbalizes ways in which the product can be abused.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eConsequence Framing\u003c/strong\u003e - Asking key questions, such as: Who informed the decisions? Who have we missed? This usually involves imagining the end or ideal state, and working backwards with the goal of finding a theme.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eFriction Auditing\u003c/strong\u003e - Developing entire UX research sprints around friction, deception, and mining for hostility where we don’t anticipate it.\u003c/li\u003e\n\u003cli\u003e\u003cstrong\u003eHarm Analysis\u003c/strong\u003e - Before launching a new feature, we can speculate potential harm, which gives us the tools to assess where our myopia lies.\u003c/li\u003e\n\u003c/ul\u003e\n\u003cp\u003eIt is important for both designers and users to understand the consequences of deceptive patterns. From the designer side, we need to recognize our own biases and practice ethical design. From the user side, we need to be aware of these manipulative tactics and make more informed decisions. Both sides can easily fall into the trap of hostile design, but if we change just a few things in the design process, we will ensure more honest and transparent interactions.\u003c/p\u003e\n"}
  ]
}
