CS474: Human Computer Interaction - Dark Patterns

Activity Goals

The goals of this activity are:
  1. To identify examples of dark patterns in everyday life
  2. To classify dark patterns into various common categories
  3. To avoid infusing dark patterns into designs and implementations

Supplemental Reading

Feel free to visit these resources for supplemental background reading material.

The Activity

Directions

Consider the activity models and answer the questions provided. First reflect on these questions on your own briefly, before discussing and comparing your thoughts with your group. Appoint one member of your group to discuss your findings with the class, and the rest of the group should help that member prepare their response. Answer each question individually from the activity, and compare with your group to prepare for our whole-class discussion. After class, think about the questions in the reflective prompt and respond to those individually in your notebook. Report out on areas of disagreement or items for which you and your group identified alternative approaches. Write down and report out questions you encountered along the way for group discussion.

Model 1: Facial Recognition Software

Face detection

Questions

  1. What are some examples in which we use facial recognition software today?
  2. What's wrong with this picture?
  3. The faces recognized in this screenshot were done using the opencv library. Given what you know about eye tracking applications, how do you think faces are recognized by software?
  4. What can you hypothesize about the manner in which this software was trained to recognize faces?

Model 2: Manipulating Human Behavior

A Snopes.com screenshot on a Scientific American article discussing a fake news post claiming that the Pope endorsed a US presidential candidate.
Clickjacking
PhishingTrustedBank
A fake unsubscribe email link as shown on Ricks Daily Tips

Questions

  1. How do people exploit human behaviors and needs?

Model 3: Dark Patterns

Types of Dark Patterns
Screencast of the USPS FOIA portal with links to required documents that lead to 404 not found pages

Questions

  1. Have you ever encountered a website whose registration was broken into multiple steps, in which the first step asks only for non-personal information, but the last step requires contact or payment information? Which dark pattern does this fall into?
  2. For each of the types of dark patterns discussed, identify some real examples that exemplify each from your own personal experience.
  3. What kind of dark pattern(s) does the United States Postal Service (USPS) example fall into? What incentive might the USPS have in requiring forms that cannot be accessed? Is an account required to submit this form (and why or why not)? What protocols might you put into place to enable accessible reporting of issues such as these?

Embedded Video

You can play the following video right here from your browser!

Submission

I encourage you to submit your answers to the questions (and ask your own questions!) using the Class Activity Questions discussion board. You may also respond to questions or comments made by others, or ask follow-up questions there. Answer any reflective prompt questions in the Reflective Journal section of your OneNote Classroom personal section. You can find the link to the class notebook on the syllabus.