Browse Definitions :
Definition

manipulative design

Manipulative design is an approach to creating user interfaces that are designed to influence or trick users into taking particular actions that they might not take otherwise.

 UI (user interface) designers and those that manage them can have a marked affect on how easy an interface is for users to grasp. However, their understanding of how to communicate and show options can also be applied to for deceptive purposes. The same psychological principles applied to make legible interfaces that are easily seen and intuitively used can be adapted for less scrupulous ends.

Some of the tendencies of an individual reading text or viewing images can be exploited to generate behavior in a user or influence them make an unintended choice. These choices may be affected by exploitation of attention span, visual interference, low contrast or fine print, bait-and-switch and other manipulative elements of UI design often called dark patterns. Expectations -- such as the idea that an X at the top of a window will close it – can be exploited by associating non-standard behaviors with familiar features.

Microsoft used that particular trick in its push for Windows 10 upgrades through its GWX (get Windows 10) app. Users were presented with a popup window whose most prominent options were "Upgrade now" and "Okay." There was a much less visible option to change the schedule or cancel the upgrade, and clicking on the X in the top-right corner was interpreted as consent rather than just closing the window.

The practice of coercive design can catch some users unaware and increase profits by way of intended charges incurred to the customer. The practice may risk customer retention, however, perhaps losing them to a competitor permanently. This deceptive design trend is also being protested by responsible and ethical UI designers.

This was last updated in June 2016

Continue Reading About manipulative design

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • threat modeling

    Threat modeling is a procedure for optimizing application, system or business process security by identifying objectives and ...

  • distributed denial-of-service (DDoS) attack

    A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a ...

  • social engineering

    Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into ...

SearchHealthIT
SearchDisasterRecovery
  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

SearchStorage
  • bare-metal cloud

    Bare-metal cloud is a public cloud service that offers dedicated hardware resources without any installed operating systems or ...

  • race condition

    A race condition is an undesirable situation that occurs when a device or system attempts to perform two or more operations at ...

  • storage security

    Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted ...

Close