Browse Definitions :
Definition

manipulative design

Manipulative design is an approach to creating user interfaces that are designed to influence or trick users into taking particular actions that they might not take otherwise.

 UI (user interface) designers and those that manage them can have a marked affect on how easy an interface is for users to grasp. However, their understanding of how to communicate and show options can also be applied to for deceptive purposes. The same psychological principles applied to make legible interfaces that are easily seen and intuitively used can be adapted for less scrupulous ends.

Some of the tendencies of an individual reading text or viewing images can be exploited to generate behavior in a user or influence them make an unintended choice. These choices may be affected by exploitation of attention span, visual interference, low contrast or fine print, bait-and-switch and other manipulative elements of UI design often called dark patterns. Expectations -- such as the idea that an X at the top of a window will close it – can be exploited by associating non-standard behaviors with familiar features.

Microsoft used that particular trick in its push for Windows 10 upgrades through its GWX (get Windows 10) app. Users were presented with a popup window whose most prominent options were "Upgrade now" and "Okay." There was a much less visible option to change the schedule or cancel the upgrade, and clicking on the X in the top-right corner was interpreted as consent rather than just closing the window.

The practice of coercive design can catch some users unaware and increase profits by way of intended charges incurred to the customer. The practice may risk customer retention, however, perhaps losing them to a competitor permanently. This deceptive design trend is also being protested by responsible and ethical UI designers.

This was last updated in June 2016

Continue Reading About manipulative design

SearchNetworking
SearchSecurity
  • man in the browser (MitB)

    Man in the browser (MitB) is a security attack where the perpetrator installs a Trojan horse on the victim's computer that is ...

  • Patch Tuesday

    Patch Tuesday is the unofficial name of Microsoft's monthly scheduled release of security fixes for the Windows operating system ...

  • parameter tampering

    Parameter tampering is a type of web-based cyber attack in which certain parameters in a URL are changed without a user's ...

SearchCIO
  • chief procurement officer (CPO)

    The chief procurement officer, or CPO, leads an organization's procurement department and oversees the acquisitions of goods and ...

  • Lean Six Sigma

    Lean Six Sigma is a data-driven approach to improving efficiency, customer satisfaction and profits.

  • change management

    Change management is a systematic approach to dealing with the transition or transformation of an organization's goals, processes...

SearchHRSoftware
SearchCustomerExperience
  • clickstream data (clickstream analytics)

    Clickstream data and clickstream analytics are the processes involved in collecting, analyzing and reporting aggregate data about...

  • neuromarketing

    Neuromarketing is the study of how people's brains respond to advertising and other brand-related messages by scientifically ...

  • contextual marketing

    Contextual marketing is an online marketing strategy model in which people are served with targeted advertising based on their ...

Close