when everyone is a designer: practical techniques for ethical design in the diy future
TRANSCRIPT
Joe LamantiaBlogTalk 2008
Joe Lamantia• Involved in user experience / Internet since 1996
• Creator of the leading freely available tool for card sorting
• Creator of the Building Blocks design framework for portals and user experiences
• Designed early social sharing / networking site ʼ99 (efavorites.com)
• Currently based in New York - but enjoys Europe a great deal…
More:
JoeLamantia.com
BoxesandArrows
UXMatters
Tagsonomy.com
2
Joe LamantiaBlogTalk 2008
Todayʼs MenuEthics, conflict, social media: impact on design
Integrated experiences
Design in the DIY future
Suggestions for managing conflicts
3
Joe LamantiaBlogTalk 2008
Main Entry: eth·ic Etymology: Middle English ethik, from Middle French ethique, from Latin ethice, from Greek EthikE, from Ethikos
1. the discipline dealing with what is good and bad and with moral duty and obligation
2. a : a set of moral principles : a theory or system of moral values
b : the principles of conduct governing an individual or a group
c : a guiding philosophy
d : a consciousness of moral importance
4
Joe LamantiaBlogTalk 2008
Spring 2007 - Tagged.com invitations proliferateYASNS: Yet Another Social
Networking Service
6
Joe LamantiaBlogTalk 2008
From: Anonymous <[email protected]>Date: May 5, 2007 4:38 PMSubject: Re: Anonymous has Tagged you! :)To: Joe Lamantia <[email protected] >
Hi Joe -
Sorry about this email - it was not sent intentionally by me and you should ignore it.
*Definitely do not visit tagged.com*
-Anonymous
7
Joe LamantiaBlogTalk 2008 9
From: Anonymous <[email protected]>Date: May 8, 2007 1:59 PMSubject: PLEASE STOP SENDING EMAILS TO PEOPLE IN MY ADDRESS BOOK!!!!!To: customer service <[email protected]>
Hi - when I signed up for tagged.com you fooled me into giving you all
the email addresses in my gmail address book. Now all 783 contacts appear to be getting emails even though I canceled my tagged.com account.
PLEASE MAKE THIS STOP IMMEDIATELY!
-Anonymous
Joe LamantiaBlogTalk 2008 10
The experience of being Tagged
“What happened next was nightmarish. My inbox started filling up with auto-responses, since
tagged was basically emailing everyone and everything in my inbox.
Emails were sent to prospective employers, jeopardizing my job prospects with them.
Emails were also sent to old girlfriends, some of who responded quite angrily. Emails were
sent to professional colleagues, some of whom will be listening to the very presentation you are giving.
I must've sent over a 100 personal responses to people apologizing profusely and explaining that the email was not sent intentionally.”
-Anonymous
Joe LamantiaBlogTalk 2008
From: Anonymous <[email protected]>Date: May 5, 2007 4:38 PMSubject: Re: Anonymous has Tagged you! :)To: Joe Lamantia <[email protected]>
Ouch. I'm really sorry about that.
I got an invite from someone and then went through the registration process which checks your contacts from GMail list as part of the registration funnel and allows you to add users in your contacts.
Little did I know that below the fold, it included every email recipient from my GMail, so when I clicked submit, it sent to every contact in my GMail account including all my email lists.
How embarrassing for me. :( I should have read the copy on the page first.
Sorry again.
11
Joe LamantiaBlogTalk 2008 13
Tagged.com Turns Profitable - May Be Fastest Growing Social Network
“Tagged is also very aggressive with signing up new users.
At registration users are strongly encouraged to invite their entire address book as friends.
Itʼs a highly viral, albeit controversial, way to quickly add lots of new users.”
Michael Arrington (of TechCrunch)
http://www.techcrunch.com/2007/05/09/tagged-turns-profitable-may-be-fastest-growing-social-network/
Joe LamantiaBlogTalk 2008
To Users / CustomersPrivacy violated
Identity hijacked
Publicly embarrassed
Personal data harvested
Damage to social fabric
Unknown future costs
To the Business
Rising number of users
Rapid growth in registrations
Leveraging network strategy
Traffic increase
Lower customer acquisition costs
Potential profitability
14
Joe LamantiaBlogTalk 2008
“it’s very simple. what if i have to choose between using this scraping technique in order to promote my service in order to achieve the network effects that every good social system aspires to cultivate,
thereby succeeding in business but violating the spirit and potential of the open web; or not doing that, not realizing those gains, and quite possibly allowing someone else to overtake us
who is willing to implement such a shortcut or just going out of business because i can’t get the traction required to make my service a success and so nobody wants to fund me because i can’t prove out my growth model?”
Lane Becker, GetSatisfaction
comment on Like It Matters
15
http://www.brianoberkirch.com/2008/01/04/this-antipattern-is-kryptonite-to-the-open-social-web/
Joe LamantiaBlogTalk 2008
“Ethical dilemmas occur when values are in conflict.”
Source: American Library Association Code of Ethics - adopted June 28, 1995
16
Joe LamantiaBlogTalk 2008
Social Software Building BlocksIdentity - a way of uniquely identifying people in the system
Presence - a way of knowing who is online, available or otherwise nearby
Relationships - a way of describing how two users in the system are related (e.g. in Flickr, people can be contacts, friends of family)
Conversations - a way of talking to other people through the system
Groups - a way of forming communities of interest
Reputation - a way of knowing the status of other people in the system (who's a good citizen? who can be trusted?)
Sharing - a way of sharing things that are meaningful to participants (like photos or videos)
17
“Social Software Building Blocks” by Gene Smith
Joe LamantiaBlogTalk 2008
Conflict: Tagged.comIdentity - misrepresentation
Relationships - reductionism or “everyone is a friend”
Reputation - ʻunfair useʼ
18
Joe LamantiaBlogTalk 2008 21
Design becomes conflict mediator• Changes role of design
• Distorts design process
• Misdirects design decisions
Joe LamantiaBlogTalk 2008 24
Introduction The first stage was that of "technological introduction" in which computer technology was developed and refined.
This already occurred in America during the first forty years after the Second World War.
PermeationThe second stage -- one that the industrialized world has only recently entered -- is that of "technological permeation" in which technology gets integrated into everyday human activities and into social institutions, changing the very meaning of fundamental concepts, such as "money", "education", "work", and "fair elections".
James H. Moor
Computer Ethics
http://plato.stanford.edu/entries/ethics-computer/
“...the computer revolution is occurring in two stages.”
Joe LamantiaBlogTalk 2008
LONDON (Reuters) - While young people embrace the Web with real or virtual friends and their cell phone is never far away, relatively few like technology and those that do tend to be in Brazil, India and China, according to a survey.
Only a handful think of technology as a concept, and just 16 percent use terms like "social networking", said two combined surveys covering 8- to 24-year-olds published on Tuesday by Microsoft and Viacom units MTV Networks and Nickelodeon.
"Young people don't see "tech" as a separate entity - it's an organic part of their lives," said Andrew Davidson, vice president of MTV's VBS International Insight unit.
"Talking to them about the role of technology in their lifestyle would be like talking to kids in the 1980s about the role the park swing or the telephone played in their social lives -- it's invisible."The surveys involved 18,000 young people in 16 countries including the UK, U.S., China, Japan, Canada and Mexico.
25
http://www.reuters.com/article/technologyNews/idUSL236796320070724
Young keep it simple in high-tech world: survey
Joe LamantiaBlogTalk 2008
Social Shift
Spread of social mechanisms and elements
Reification of existing social structures
Products & services acquire social layer
New socially based offerings (SNS)
Designing social systems & experiences
26
Joe LamantiaBlogTalk 2008
More Than NetworkingDiverse user groups
Self-defined user communities
Overlapping identities
Group and community dynamics
Social memory
Social identity mechanisms
Reputation banking
Influence trading
Cultural differences
Power distance indexes
White-label social networks
Relationship markups
FOAF
OpenID
OpenSocial
Enterprise 2.0
Knowledge markets
Tagging / folksonomies
27
Joe LamantiaBlogTalk 2008 31
Are You Getting Quechup Spammed?
“One site thatʼs catching people off guard is Quechup: weʼve got a volley of complaints about them in the mailbox this weekend, and a quick Google reveals that others were caught out too.
The issue lies with their “check for friends” form: during signup youʼre asked to enter your email address and password to see whether any of your friends are already on the service.
Enter the password, however, and it will proceed to mail all your contacts without asking permission. This has led to many users issuing apologies to their friends for “spamming” them inadvertently. Hopefully the bad PR on this one will force them to change the system.”
September 2, 2007 Pete Cashmore
http://mashable.com/2007/09/02/quechup/
Joe LamantiaBlogTalk 2008
Social Network Anti-Patterns1. Spam Your Contacts
2. Enter Your Other Site Log-in
3. Join to Fix Your Profile
4. One Unified Social Network
5. I Heard You the First Time
6. Wonʼt Take No For An Answer
7. ??
32
http://microformats.org/wiki/snpantipatterns
Joe LamantiaBlogTalk 2008
Rise of the SPIME
Virtual and physical boundaries blur
Objects, spaces, information interact
Products, services & data connectedIPv6 & RFID
GIS & geo-location
Ubiquitous connectivity
Smart Objects Product Life Cycle Management
33
Joe LamantiaBlogTalk 2008
In the future, an object's life begins on a graphics screen. It is born digital. Its design specs
accompany it throughout its life. It is inseparable from that original digital blueprint, which rules the material world. This object is going to tell you -- if you ask -- everything that an expert would tell you about it. Because it WANTS you to become an expert.
34
When Blobjects Rule the Earthby Bruce Sterling
SIGGRAPH, Los Angeles, August 2004
Joe LamantiaBlogTalk 2008
Data Portability
Data portability is about you, the user, being able to move and use your data across space and across time.
your data - whether you created it or purchased itacross space - different websites, different devices, different media, different applications, space-shifting in generalacross time - archiving at one point in time, retrieving at another point in time, time-shifting in general
36
http://microformats.org/wiki/data-portability
Joe LamantiaBlogTalk 2008
What happens when you can tap into the physical experience of every person you've ever received a business card from?
How are we going to handle the social boundaries then?
38
boyd, danah. 2007. "Incantations for Muggles: The Role of Ubiquitous Web 2.0 Technologies in Everyday Life." O'Reilly Emerging Technology Conference, San Diego, CA. March 28.
http://www.danah.org/papers/Etech2007.html
Joe LamantiaBlogTalk 2008
Mediated publics have four properties that are not present in unmediated publics:
• Persistence
• Searchability
• Replicability
• Invisible Audiences
40
boyd, danah. 2007. "Incantations for Muggles: The Role of Ubiquitous Web 2.0 Technologies in Everyday Life." O'Reilly Emerging Technology Conference, San Diego, CA. March 28.
http://www.danah.org/papers/Etech2007.html
Joe LamantiaBlogTalk 2008
DIY (Do It Yourself) Shift
Lowered entry barriers to design and create
Creator vs. consumer distinction blurs
Flattened control & management structures
Fluid economic and cultural models
41
Joe LamantiaBlogTalk 2008
The DIY Shift
• Web 2.0, culture of contribution, self-publishing
• Commoditized design, development & manufacturing
• ʻShadow ITʼ
• Open Source & public data sets
• APIs, Web Services, SOA
• Mashup infrastructure: Yahoo Pipes, Google Gadgets
• Physical goods: fab, ReadyMade, Make
42
Joe LamantiaBlogTalk 2008
iPad Touch ProductConceptRenderings
http://factoryjoe.com
46
Joe LamantiaBlogTalk 2008
Integrated Experiences & Environmentssocially sensitive
legally regulated
contextually ambiguous
physically uncomfortable
cognitively stressful
erratically connected
biologically / medically sensitive
ecologically constrained
culturally diverse
49
Joe LamantiaBlogTalk 2008
Integration “amplifies” experiencesSocial & systemic mechanisms:
• sharing
• broadcasting
• feedback
• catalysis
• synchronization
increases ethical impact of design decisions
50
Joe LamantiaBlogTalk 2008
“The systems we keep will be hybrid creations. They will have a strong rootstock of peer-to-peer generation, grafted below highly refined strains of controlling functions. Sturdy, robust foundations of user-made content and crowd-sourced innovation will
feed very small slivers of leadership agility. Pure plays of 100% smart mobs or 100% smart elites will be rare.
The real art of business and organizations in the network economy will not be in harnessing the crowd of "everybody" (simple!) but in finding the appropriate hybrid mix of bottom and top for each niche, at the right time. The mix of control/no-control will shift as a system grows and matures.”
Kevin Kelly The Bottom is Not Enough
54
http://www.kk.org/thetechnium/archives/2008/02/the_bottom_is_n.php
Joe LamantiaBlogTalk 2008
Design: Then
5588
component
product / solution
template
systemScope
Persistence
pattern
Joe LamantiaBlogTalk 2008 56
Platforms and Frameworks
Networks
Games and Self-Teaching Systems
Processes and Services
Physical and Emotional Environments
Systems
Communities
The New Designer
Joe LamantiaBlogTalk 2008
Design: Now
57
component
product / solution
template
system
process / service
environment / framework
standard
Scope
Persistence
network
pattern
Designers
Co-creators / DIY
Joe LamantiaBlogTalk 2008
Designers create the tools other people use to create experiences for themselves, and the world.
58
Joe LamantiaBlogTalk 2008
"I created the platform, and then I got out of the way. Sometimes the best thing you can do is get out of the way.''Craig Newmark
60
http://www.sfgate.com/cgi-bin/article.cgi?file=/chronicle/archive/2004/10/10/LVGU693SFD1.DTL
Joe LamantiaBlogTalk 2008 61
“A typical problem in computer ethics arises because there is a policy vacuum about how computer technology should be used. Computers provide us with new capabilities and these in turn give us new choices for action.
Often, either no policies for conduct in these situations exist or
existing policies seem inadequate. A central task of computer ethics is to determine what we should do in such cases, that is, formulate policies to guide our actions....
One difficulty is that along with a policy vacuum there is often a conceptual vacuum. Although a problem in computer ethics may seem clear initially, a little reflection reveals a conceptual muddle.”
Moor, James H. (1985) "What Is Computer Ethics?" In Bynum, Terrell Ward, ed. (1985) Computers and Ethics, Blackwell, 266-75.
[Published as the October 1985 issue of Metaphilosophy.]
Joe LamantiaBlogTalk 2008 62
“Just as the major ethical theories of Bentham and Kant were developed in response to the printing
press revolution, so a new ethical theory is likely to emerge from computer ethics in response to the computer revolution.”
Krystyna Gorniak-Kocikowska, "The Computer Revolution and the Problem of Global Ethics" 1996,
Joe LamantiaBlogTalk 2008
Design must find effective ways to manage conflict, encourage
the creation of ethical experiences, and avoid ethically
unsatisfactory compromises.
63
Joe LamantiaBlogTalk 2008 65
Professional Codes• top-down• costly• slow to change• general
...Do not help resolve conflicts
Joe LamantiaBlogTalk 2008 66
UX Design approaches do not address conflictElements of Experience
Emotional Design
Forces of User Experience
Experience Design
Design Maturity Model
Making Meaning
User Centered Design
User Experience Honeycomb
User Centric Design
Contextual Design
Activity Centered Design
Participatory Design
Joe LamantiaBlogTalk 2008
“The Ethical Design Kit”
Strategy
Clear Goals
Simple Process
Neutral Framework
Practical Tools & Techniques
68
Joe LamantiaBlogTalk 2008 69
Treat conflict as a natural part of integrated experiencesFrame conflict as “new layer” of experience model
Adapt common design methods and tools
Include conflict as a subject from the start
Address conflicts as they arise
Insist on resolution
Joe LamantiaBlogTalk 2008
Ethical FadingWhen ethical fading occurs, a person does not realize that the decision she is making has ethical implications, and ethical criteria do not enter into her decision.
When the ethical dimensions of the decision are hidden, the should self has no reason to be activated, the want self is allowed to freely dominate the decision and unethical behavior ensues.
70
Why We Aren’t as Ethical as We Think We Are: A Temporal Explanation
Joe LamantiaBlogTalk 2008 71
3 Goals for Design
1Create ethical experiences
Our most important goal in this effort is to ensure the user experiences we create are ethical in every aspect.
2Focus on Design,
not mediation
3Use Design compromises
for Design problems
A second goal is to remove design from the uncomfortable position of ad-hoc mediator for unresolved conflicts between other perspectives and stakeholders, conflicts that get ʻpassed downʼ to design for resolution
A third goal is to eliminate (reduce) design compromises made to satisfy external conflicts: Design compromises should resolve design problems, not ethical dilemmas or conflicts between stakeholders.
Joe LamantiaBlogTalk 2008
Conflict Resolution Process1. Discover: When a conflict arises, identify the sources of the conflict in terms of ethical or
other values (for example, privacy laws and preferences) affected, as well as all affected parties.
2. Understand: Explore the implications of conflicts (ethical, legal, experiential, business, design, etc.), as well as the tradeoffs and costs vs. benefits of likely compromises.
3. Educate: Share insights and understanding with all relevant stakeholders.
4. Resolve: Identify resolution strategies and possible compromises. Using agreed on resolution mechanisms, resolve the identified conflict before making design decisions.
72
Joe LamantiaBlogTalk 2008
FrameworksAddresses direct concerns of stakeholders
Neutral
Serves as mediator
Guides resolution activities
Stable language
Allows assessment and comparison of alternatives
Sell once, use often
74
Joe LamantiaBlogTalk 2008
Ethical Principals for UX in Ubiquitous Computing1. Default to harmlessness.
Ubiquitous systems must default to a mode that ensures their usersʼ (physical, psychic and financial) safety.
2. Be self-disclosing.
Ubiquitous systems must contain provisions for immediate and transparent querying of their ownership, use, capabilities, etc., such that human beings encountering them are empowered to make informed decisions regarding exposure to same.
3. Be conservative of face.
Ubiquitous systems are always already social systems, and must contain provisions such that wherever possible they not unnecessarily embarrass, humiliate, or shame their users.
4. Be conservative of time.
Ubiquitous systems must not introduce undue complications into ordinary operations.
5. Be deniable.
Ubiquitous systems must offer users the ability to opt out, always and at any point.
http://www.boxesandarrows.com/view/all_watched_over_by_machines_of_loving_grace_some_ethical_guidelines_for_user_experience_in_ubiquitous_computing_settings_1_
76
Joe LamantiaBlogTalk 2008 77
September 5, 2007
A Bill of Rights for Users of the Social WebFiled under: Open Social Web — jsmarr @ 5:31 am Preamble:There are already many who support the ideas laid out in this Bill of Rights, but we are actively seeking to grow the roster of those publicly backing the principles and approaches it outlines. That said, this Bill of Rights is not a document “carved in stone” (or written on paper). It is a blog post, and it is intended to spur conversation and debate, which will naturally lead to tweaks of the language. So, let’s get the dialogue going and get as many of the major stakeholders on board as we can!
A Bill of Rights for Users of the Social WebAuthored by Joseph Smarr, Marc Canter, Robert Scoble, and Michael ArringtonSeptember 4, 2007
We publicly assert that all users of the social web are entitled to certain fundamental rights, specifically:
• Ownership of their own personal information, including: ◦ their own profile data ◦ the list of people they are connected to ◦ the activity stream of content they create; • Control of whether and how such personal information is shared with others; and • Freedom to grant persistent access to their personal information to trusted external sites.
Sites supporting these rights shall:
• Allow their users to syndicate their own profile data, their friends list, and the data that’s shared with them via the service, using a persistent URL or API token and open data formats;
• Allow their users to syndicate their own stream of activity outside the site; • Allow their users to link from their profile pages to external identifiers in a public way; and • Allow their users to discover who else they know is also on their site, using the same external identifiers made
available for lookup within the service.
Joe LamantiaBlogTalk 2008
Conflict-Aware Design ArtifactsAgnostic: fits most processes, methods and teams
Changes what is documented, not how, when, where
80
Joe LamantiaBlogTalk 2008
Ethical“Doing so allows us to see that in choosing the unethical action, we are not choosing the ethical act.”
Unethical“Not doing so allows the ethical choice to hide in the background and helps to fade just how unethical the unethical choice is.”
81
Why We Aren’t as Ethical as We Think We Are: A Temporal Explanation
“In ethical dilemmas, we should envision two choices before us – the ethical choice and the unethical choice.”
Joe LamantiaBlogTalk 2008 82
Vision ThemesHow To Address Conflict:
• Prioritize all elements for their importance to the overall vision, ranking them or scoring them using simple criteria. Do not score or rank conflicted items
Vision Themes Stakeholderand Business Requirements
Personas User Goalsand Needs
Scenarios Functional Requirements
ConceptModels
Site Maps
• Identify conflicting elements and set them aside.• When two items conflict directly, require stakeholders to choose only one.• When multiple items conflict, require stakeholders to choose only one. • Treat conflicting instances as optional. Set all conflicting items aside for consideration in the future.• Use a Delphi process to redefine conflicting items. • Require unanimous consent from all stakeholders to include any individual items.• Require unanimous consent from all stakeholders that the collected vision items are those needed and
adequate.
Joe LamantiaBlogTalk 2008 83
How To Address Conflict:
• Map conflicts back to defined business strategies and goals.• Set aside any requirements that contain or inspire conflict as
tentative / potential / non-material for design purposes.
Stakeholder and Business Requirements
Vision Themes Stakeholderand Business Requirements
Personas User Goalsand Needs
Scenarios Functional Requirements
ConceptModels
Site Maps
Joe LamantiaBlogTalk 2008 84
Map conflicts to business strategy and goalsVision Themes Stakeholder
and Business Requirements
Personas User Goalsand Needs
Scenarios Functional Requirements
ConceptModels
Site Maps
Joe LamantiaBlogTalk 2008 85
How To Address Conflict:
• Prioritize all personas based on business goals• Identify and call out conflicts for each persona• Identify any personas associated with conflicts. Set them
aside, and then prioritize the remaining personas relative to each other.
PersonasVision Themes Stakeholder
and Business Requirements
Personas User Goalsand Needs
Scenarios Functional Requirements
ConceptModels
Site Maps
• Compare the priorities before and after. Large differences indicate personas that may not be essential• Enumerate any individual attributes that conflict. When personas share a conflicted attribute, strike the
attribute from further consideration in the design • Map the persona landscape as a family tree or circle, identifying relationships and conflicts with other
personas.• Remove all personas with more than a maximum number of conflicted relationships• Set a threshold for how many personas associate with conflicts may remain• Remove personas associated with conflicts one at a time, beginning with the lowest priority, until the
threshold is met.
Joe LamantiaBlogTalk 2008 86
Chen XiangInvestment Banker, Shanghai, China
Surveyor: Emerging Market Development >
Corporate User
Subsidiary Seeker
General Description
Chen is a recent graduate and a new employee of the Bank of China. In his role as an investment banker he will be helping to structure debt offerings and sell them in China’s emerging capital markets. He knows that a respected and authoritative third party assessment of the debt will increase its liquidity and improve its price in the marketplace.
As such he is working to assess the relative advantages and disadvantages of using the emerging local ratings agencies versus the internationally established agencies such as Client.com. He is looking to find the highest levels of transparency, so that he can be confident in whom he chooses to work with moving forward.
Critical User Needs
Learn about Client.com and their operations in China
Select the agency he feels will be best for his clients
Key Job Functions
Assist corporations in raising funds in China’s emerging capital markets
Provides strategic advisory services for mergers, acquisitions and other types of corporate financial transactions
Conflicts and Opportunities
Highlight the breadth and depth of information offered in each country / region
Support localization, allowing content, search parameters, currency, reference indices, and formatting styles to be targeted to user’s preferred region and language
Identify conflicts relevant to individual personasVision Themes Stakeholder
and Business Requirements
Personas User Goalsand Needs
Scenarios Functional Requirements
ConceptModels
Site Maps
“I’m looking for a ratings agency I can partner with.”
Joe LamantiaBlogTalk 2008 87
How To Address Conflict:
• Identify instances of direct conflict between individual goals – some will conflict across all types of users
• Identify instances of conflict between types of users based on conflicts in their unique goals.
• Score the severity of any conflicts on a simple scale (1-5) to highlight trouble spots. Set thresholds for how much
User Goals and Needs
Vision Themes Stakeholderand Business Requirements
Personas User Goalsand Needs
Scenarios Functional Requirements
ConceptModels
Site Maps
conflict is acceptable.• Total the number of conflicts associated with each goal; above a certain threshold, set the goal aside, and consider addressing it with
another design solution• Total the number of conflicts associated with each user type; above a certain threshold, set the user type aside, and consider
addressing it with another design solution• Total the degree of conflict associated with each goal. If a goal scores high enough, set it aside; problematic goals may be better
met by another design solution• Total the degree of conflict associated with each user type. If a user type scores high enough, set it aside; problematic user types
might be better served by another design solution• Compare the conflict associated with each user type to their relative priority. Remove user types with high conflict scores and lower
priorities. For user types with high priorities and high conflict scores, set them aside and consider providing another design solution.
Joe LamantiaBlogTalk 2008 88
How To Address Conflict:
• Identify scenarios that contain internal conflicts; eg. between the personas mentioned, the goals and needs of a single persona, the environment and the personas mentioned, or otherwise.
• When conflicts across several scenarios are rooted in a single business process, experience, goal, or other element, remove it from the pool of items, and rewrite the scenarios to reflect its absence. If the gestalt is still coherent, set the element.
ScenariosVision Themes Stakeholder
and Business Requirements
Personas User Goalsand Needs
Scenarios Functional Requirements
ConceptModels
Site Maps
• Identify and cross reference all scenarios that conflict with any other scenarios in terms of outcome (end state) or starting conditions. Heavily conflicted scenarios point to overlapping intersections of unbalanced needs and goals, concepts, mental models, or other motivators.
• Create scenarios that focus on and relate the root causes of conflicts in terms of values or experiences for the affected personas, instead of framing from the business point of view.
• When conflicts across several scenarios are rooted in a single persona, consider removing the common persona from the expected audience for the design solution
• Compare scenarios that depict or describe a future state for an envisioned solution, product, process, etc. When these scenarios conflict, use a Delphi process to recreate them and resolve conflicts.
Joe LamantiaBlogTalk 2008 89
Vision Themes Stakeholderand Business Requirements
Personas User Goalsand Needs
Scenarios Functional Requirements
ConceptModels
Site Maps
Joe LamantiaBlogTalk 2008 90
How To Address Conflict:
• Cross-reference conflicting requirements by owner or sponsor. Require owners or sponsors to negotiate conflicts independently.
• ʻNarrow the funnelʼ: reduce the number of allowed conflicts at successive revisions of the collected requirements
• Auction a (very) limited set of conflict slots, allowing owners to bid on requirements with a fixed number of points. Reduce the number of conflict slots available in each succeeding version of the functional requirements.
FunctionalRequirements
Vision Themes Stakeholderand Business Requirements
Personas User Goalsand Needs
Scenarios Functional Requirements
ConceptModels
Site Maps
Joe LamantiaBlogTalk 2008 91
How To Address Conflict:
• Begin with a simplified single conceptual model. Set aside any objects that inspire conflict in their definition or relationships
• Create additional models to capture different views.• Compare the amount of conflict in each, and choose a single model
to move forward with.• List contested objects / concepts, and rank them in order of priority.
Set aside all conflicted objects below a certain threshold.• Remove all conflicted objects. Set a threshold for the number of
conflicted objects the design will accommodate. • Replace conflicted objects one a time, in order of priority, beginning
with the highest ranking, until the threshold is met.• Remove all instances of a conflicted relationship. Assign each a
priority.• Replace conflicted relationships one a time, in order of priority,
beginning with the highest ranking, until the threshold is met.
Concept ModelsVision Themes Stakeholder
and Business Requirements
Personas User Goalsand Needs
Scenarios Functional Requirements
ConceptModels
Site Maps
Joe LamantiaBlogTalk 2008 92
How To Address Conflict:
• Compare / contrast conflicting high-level structures • Build modularly, highlight areas of conflict • Document conflicts in navigation model separately• Flag conflicts in content structure and detailed
information discussed in other artifacts - topic maps, taxonomies, etc.
• Cross-reference to alternative functional interactions and flows (use cases and process flows)
Site MapsVision Themes Stakeholder
and Business Requirements
Personas User Goalsand Needs
Scenarios Functional Requirements
ConceptModels
Site Maps
Joe LamantiaBlogTalk 2008
As we sit here and think about the spells that we're casting, let's not forget that some spells are made accidentally and some magic has unintended consequences.
Technology is soaking into the woodwork of society. But we, as technologists, have a responsibility to keep people in mind at all times. Their practices inform us
but our unintended consequences affect them. It is ubiquitous, but
ubiquitous is not always positive. As you build technologies that allow the magic of everyday people to manifest, i ask you to consider the good, the bad, and the ugly.
93
Joe LamantiaBlogTalk 2008 94
Questions?
Go raibh maith agaibh!
Full version: www.slideshare.net/MoJoe
Joe LamantiaBlogTalk 2008
From: Anonymous <[email protected]>Date: September 13, 2007 10:34:28 AM EDTTo: Joe Lamantia <[email protected]>Subject: Re: Tagged.com email address harvesting
Ugh. Don't make me relive that experience. The funny things is that most of the facebook apps that I'm installing these days feature the opt out method of inviting your friends, e.g. the flixter quiz.
Anyway, here's the apology I wrote to all my contacts. If youpublish anything about this, I would appreciate if you not mention me by name, for obvious reasons.
-Anonymous
96
Joe LamantiaBlogTalk 2008 97
this antipattern is kryptonite to the open social web 04jan08
We keep wagging our collective fingers about this antipattern of asking users to input their credentials for another service but evidently no one is listening. As I see
Plaxo trumpeting a new ’service’ that consists of just this: using your Facebook credentials to scrape your friends’ contact information and import it into Plaxo Pulse, in direct violation of Facebook TOS and in indirect violation of the ethical agreement ‘friends’ make when they offer access to their profiles within the bounds of Facebook.
Let’s be clear about this: designing the open social Web has nothing to do with encouraging users to violate the TOS of another Web service.
Putting users in control of (and teaching them to take responsibility for) their own data and giving them the tools and contextual prompts to do the right thing has nothing to
do with duping them into letting you run a scraping script for your own benefit. It’s time to stop looking the other way when it comes to
this practice and note that your short term gains (in terms of new
users, better meshed users, etc.) come with some high prices in the long run.
Brian Oberkirch
http://www.brianoberkirch.com/2008/01/04/this-antipattern-is-kryptonite-to-the-open-social-web/
[See this? Don’t do this.]
Joe LamantiaBlogTalk 2008
Design works to understand people
• who they are
• how they think
• what they value
• how they feel
Build empathy
Create relationships
98
Joe LamantiaBlogTalk 2008 99
WantThe want self reflects actual behavior that is characterized more by self-interest and by a relative disregard for ethical considerations.
“...our desire to close the sale causes us to make misleading statements”
ShouldThe should self encompasses ethical intentions and the belief that we should behave according to ethical principles.
“we know we should behave ethically when negotiating with our client”
Why We Aren’t as Ethical as We Think We Are: A Temporal Explanation
Joe LamantiaBlogTalk 2008
“Social software” is turning out to be the monster that ate everything. Which only makes sense. The Web is inherently social, and so are human beings. Anything that better enables the flow of natural social behaviors (rather than more artificial broadcast/consume behaviors) is going to grow like kudzu in Georgia.
Anybody thinking of social software as a special category of software design needs to wake up and smell the friends list. Everything from eBay to Plaxo is integrating social networking tools into their services, and Google is looking to connect them all together (or at least change the game so that all must comply or die of irrelevance).
Andrew Hinton, Information Architect
100
Seven Years, and How Social Software eats everythinghttp://www.inkblurt.com/archives/520
Joe LamantiaBlogTalk 2008 101
Designing Web Applications for Use
By Larry Constantine, Constantine & Lockwood, Ltd. - Dec 11, 2006
“A third problem with users is that there are so many of them. And they are all different. They want different things and like different things and react differently. I have watched teams run in circles as they redesign for each new user who gives them feedback on a paper prototype or each new group passing through the usability lab.
The genuine diversity of real people can distract designers from the commonality of their needs and interests.”
http://www.uie.com/articles/designing_web_applications_for_use/
Joe LamantiaBlogTalk 2008
The most important thing to know about Spimes is that they are precisely located in space and time. They have histories. They are recorded, tracked, inventoried, and always associated with a story.
Spimes have identities, they are protagonists of a documented process.
102
When Blobjects Rule the Earthby Bruce Sterling
SIGGRAPH, Los Angeles, August 2004
Joe LamantiaBlogTalk 2008
"Privacy and ownership of information are at the core of the social graph issues.
Much like there is a conflict of interest around attention information between online
retailers and users, there is a mismatch between what individuals and companies want from social networks.
When any social network starts, it is hungry to leverage other networks…
But as individuals, we do not care about either young or old networks. We care about ease of use and privacy."
Social Graph: Concepts and Issues, by Alex Iskold
103
Joe LamantiaBlogTalk 2008
How Sticky Is Membership on Facebook? Just Try Breaking FreeBy MARIA ASPANPublished: February 11, 2008
While the Web site offers users the option to deactivate their accounts, Facebook servers keep copies of the information in those accounts
indefinitely. Indeed, many users who have contacted Facebook to request that their accounts be deleted have not succeeded in erasing their records from the
network.
“It’s like the Hotel California,” said Nipon Das, 34, a director at a biotechnology consulting firm in Manhattan, who tried unsuccessfully to delete his
account this fall. “You can check out any time you like, but you can never leave.”
The technological hurdles set by Facebook have a business rationale: they allow ex-Facebookers who choose to return the ability to resurrect their
accounts effortlessly. According to an e-mail message from Amy Sezak, a spokeswoman for Facebook, “Deactivated accounts mean that a user can reactivate at
any time and their information will be available again just as they left it.”
104
But it also means that disenchanted users cannot disappear from the site without leaving
footprints. Facebook’s terms of use state that “you may remove your user content from the site
at any time,” but also that “you acknowledge that the company may retain archived copies of
your user content.”
Its privacy policy says that after someone deactivates an account, “removed information may
persist in backup copies for a reasonable period of time.”
Facebook’s Web site does not inform departing users that they must delete
information from their account in order to close it fully — meaning that they may
unwittingly leave anything from e-mail addresses to credit card numbers sitting on Facebook
servers.
Joe LamantiaBlogTalk 2008
This is quite different from the society that you and i were used to growing up.
We were used to having walls. We assumed that the norms were set by the environment and that you behaved differently in synagogue than in the pub and that was AOK.
Context was key but context depends on there being walls. Online, there are no walls.
The walls have come crumbling down.
105
boyd, danah. 2007. "Incantations for Muggles: The Role of Ubiquitous Web 2.0 Technologies in Everyday Life." O'Reilly Emerging Technology Conference, San Diego, CA. March 28.
http://www.danah.org/papers/Etech2007.html
Joe LamantiaBlogTalk 2008
“Improving our ethical behavior thus requires us to direct our attention toward aligning our want and should selves.”
1. Recognizing our multiple selves
2. Listen to and incorporate the needs of the want self
3. Increase the influence of the should self
4. decrease the influence of the want self
106
Why We Aren’t as Ethical as We Think We Are: A Temporal Explanation