1 Polite Computing Software that respects the user Brian Whitworth © 2002, [email protected].

38
1 Polite Computing Software that respects the user Brian Whitworth © 2002, [email protected]

Transcript of 1 Polite Computing Software that respects the user Brian Whitworth © 2002, [email protected].

Page 1: 1 Polite Computing Software that respects the user Brian Whitworth © 2002, bwhitworth@acm.org.

1

Polite Computing

Software that respects the user

Brian Whitworth © 2002, [email protected]

Page 2: 1 Polite Computing Software that respects the user Brian Whitworth © 2002, bwhitworth@acm.org.

© Brian Whitworth 2005

[email protected]

2

Selfish Software Installations that take over your computer

– Run themselves at start-up, and use memory– Fill task bar and desktop– Take over your file associations

Spam that takes over your inbox Software that dials up when it wants to Pop-ups that take over your browser Spyware/stealthware uses your computer to

record your actions unknown to you, etc

The common issue? Selfish Software

Page 3: 1 Polite Computing Software that respects the user Brian Whitworth © 2002, bwhitworth@acm.org.

© Brian Whitworth 2005

[email protected]

3

The Effect? Internet is becoming an unpleasant place to be Not by lack of usability, but lack of sociability Success requires social and technical

development– Can technology benefits work without civil society?

Online trade benefits both buyer and seller– Yet it remains under 10% of all trade, e.g. for

stationary goods, it is 7%– This is one reason the “dotcoms” failed

The generally accepted cause – lack of trust Reduced willingness to interact online

Page 4: 1 Polite Computing Software that respects the user Brian Whitworth © 2002, bwhitworth@acm.org.

© Brian Whitworth 2005

[email protected]

4

Our Response? Two approaches:

– Attack the problem: declare war on spam, develop laws to declare popups illegal, privacy movements to demand user rights, use firewalls, filters, anti-spyware..

– Develop a solution, or “antidote”:POLITE COMPUTING

Society developed politeness because it has real evolutionary value

Page 5: 1 Polite Computing Software that respects the user Brian Whitworth © 2002, bwhitworth@acm.org.

© Brian Whitworth 2005

[email protected]

5

What is politeness? Webster:

– “Exhibiting in manner or speech a considerate regard for others.”

Being considerate to others is the opposite of selfishness

Considering others is socially productive!– Compare the productivity of civilization vs no

rules of conduct Every society has rules for politeness – should

not online society have the same?

Page 6: 1 Polite Computing Software that respects the user Brian Whitworth © 2002, bwhitworth@acm.org.

© Brian Whitworth 2005

[email protected]

6

Etiquette vs Politeness Etiquette: Polite behaviors (proscribed

and prescribed), that vary from culture to culture– Etiquettes cannot be transferred to the

online setting, as they are all different Politeness: The general goal of

consideration for others, is common While etiquette varies between cultures,

the goal, of politeness, does not

Page 7: 1 Polite Computing Software that respects the user Brian Whitworth © 2002, bwhitworth@acm.org.

© Brian Whitworth 2005

[email protected]

7

Is politeness agreeability? Reeves and Nass:

– When another says “I think I’m a good teacher; what do you think?”, polite people must respond “You’re great”, even if they don’t think so (Nass, 2004).

Is politeness just fake niceness? Being agreeable does not define politeness if one can

be polite but not agreeable, & agreeable but not polite– One can politely refuse, beg to differ, respectfully object

and humbly criticize, i.e. disagree, but still be polite.

– Giving money to the poor is kind and agreeable to them, but philanthropists may not be polite

Page 8: 1 Polite Computing Software that respects the user Brian Whitworth © 2002, bwhitworth@acm.org.

© Brian Whitworth 2005

[email protected]

8

The general form A general politeness form can arise if the person being

considered knows what considers them. Then it is always considerate to give them choices

– This does not presume to know what they want For example

– Hold a door open for a mother with a baby, and say “After you”, this offers choice, and is polite.

– If the baby needs attention, the mother may say “No thank you”, and attend the baby not the door.

– Without choice, any “good” act can be bad, including helping little old ladies cross the street.

Page 9: 1 Polite Computing Software that respects the user Brian Whitworth © 2002, bwhitworth@acm.org.

© Brian Whitworth 2005

[email protected]

9

Examples In conversation, the interaction locus of control

passes back and forth – Interrupting is impolite, as it takes choice – Letting another finish is polite, as they choose when

to stop. – Asking permission is polite, as it gives choice

“Please” and “Thank you” imply choice. – Please implies the choice to say no - one does not

ask “Please” if the other has no choice – “Thank you” also implies the other had choice

Page 10: 1 Polite Computing Software that respects the user Brian Whitworth © 2002, bwhitworth@acm.org.

© Brian Whitworth 2005

[email protected]

10

Politeness aspects

To offer choice to another Not to disable the choice of another Cf Brown & Levinson- politeness is

– Maintain positive “face”, by giving choice– Avoid negative “face”, by not wrongfully

taking another’s choice

Page 11: 1 Polite Computing Software that respects the user Brian Whitworth © 2002, bwhitworth@acm.org.

© Brian Whitworth 2005

[email protected]

11

Details Offending another is impolite if it forces a

negative state on the other person– But politeness is not just not offending

Can one offer choice when one has no choice oneself?– Politeness is a human property

It can be polite to talk if the other person prefers that– Giving the locus of control does not mean forcing the

locus (and burden) of action upon another. Is the “consideration” of illegal acts polite?

Page 12: 1 Polite Computing Software that respects the user Brian Whitworth © 2002, bwhitworth@acm.org.

© Brian Whitworth 2005

[email protected]

12

Politeness Definition

Politeness is any unrequired support for situating the locus of choice control of a

social interaction with another party to it, given that control is desired, rightful and

optional.

Page 13: 1 Polite Computing Software that respects the user Brian Whitworth © 2002, bwhitworth@acm.org.

© Brian Whitworth 2005

[email protected]

13

Politeness & Legitimacy

Polite

Legitimate

Anti-Social

Degree of choice offered

Note: The law is the current formal legitimacy requirements.

Politeness is offering more than the law requires

Page 14: 1 Polite Computing Software that respects the user Brian Whitworth © 2002, bwhitworth@acm.org.

© Brian Whitworth 2005

[email protected]

14

Research Question

In a computer-human interaction involving valued physical, informational

and cognitive resources, will polite software be used and accepted more, and deleted and disabled less, than impolite

software?

Page 15: 1 Polite Computing Software that respects the user Brian Whitworth © 2002, bwhitworth@acm.org.

© Brian Whitworth 2005

[email protected]

15

Polite Benefit Successful online businesses are polite

– Google– E-Bay– Amazon

They avoid pop-up ads, screaming ads, spam, privacy abuses, secret spyware, and all illegitimate PC use

Politeness pays because customers given choices come back

Page 16: 1 Polite Computing Software that respects the user Brian Whitworth © 2002, bwhitworth@acm.org.

© Brian Whitworth 2005

[email protected]

16

Specifying Politeness In the example of someone politely

holding open a door for another, there are four elements to the politeness

1. Respect user choices. Do not preempt end-user choices

2. Disclose yourself. Declare oneself, be visible

3. Offer choice. Offer useful choices 4. Remember past choices. Don’t force

users to choose continuously

Page 17: 1 Polite Computing Software that respects the user Brian Whitworth © 2002, bwhitworth@acm.org.

© Brian Whitworth 2005

[email protected]

17

1. Respect user choices. In social interaction choices may overlap, e.g.

one party’s choice may prevent another’s. Polite computing means programs don’t try to

dominate the computer-human interaction Polite software should not act unilaterally on

common resources without permission, including the desktop, registry, hard drive, task bar, file associations, quick launch or other settings.

If people own the computers they purchase, applications should only act with user consent

Page 18: 1 Polite Computing Software that respects the user Brian Whitworth © 2002, bwhitworth@acm.org.

© Brian Whitworth 2005

[email protected]

18

2. Disclosure To act secretly behind another’s back, to

sneak or hide for any reason, is impolite. Why is it polite to introduce yourself? Non self-disclosure reduces another’s

interaction choices. A hidden party is untouchable, and thus

unaccountable for their actions. If polite people introduce themselves, polite

software should do the same

Page 19: 1 Polite Computing Software that respects the user Brian Whitworth © 2002, bwhitworth@acm.org.

© Brian Whitworth 2005

[email protected]

19

3. Offer choice To be useful, a choice must be understood

as well as desired. To confuse with complex options is impolite

and inconsiderate. A choice misunderstood is not a choice at all

Are we too ignorant to understand the complexities of a software install? - the same argument could apply to installing satellite TV.

A complex act, like an installation, can be made simple by analyzing choice dependencies

Page 20: 1 Polite Computing Software that respects the user Brian Whitworth © 2002, bwhitworth@acm.org.

© Brian Whitworth 2005

[email protected]

20

4. Remember past choices It is not enough to give choices now but

forget them later. If previous responses are forgotten, the user

must redo them, which is inconsiderate It is polite to remember

– Yet every time I open Explorer it goes to its preferred directory forcing me to wait, as it finds and fills it’s list panel with innumerable files I don’t want to see.

– Each time I interact with Explorer, it acts as if it were the first time I had used it - though I am the only person it has ever known.

Page 21: 1 Polite Computing Software that respects the user Brian Whitworth © 2002, bwhitworth@acm.org.

© Brian Whitworth 2005

[email protected]

21

Social Error A logic error can cause an information

flow failure that in turn causes a system failure or “crash”.

A social “error”, like impoliteness, can cause a social failure, which causes the user to end the interaction

The end effect of compiler and user rejection are the same - the application does not run.

Page 22: 1 Polite Computing Software that respects the user Brian Whitworth © 2002, bwhitworth@acm.org.

© Brian Whitworth 2005

[email protected]

22

Mr Clippy Mr. Clippy was Office ‘97’s assistant, a

paper clip figure who guessed you were having a problem and stepped in to lend a hand.

Using advanced Bayesian logic, he was touted as the future of smart help.

His most famous line: “It looks like your writing a letter…” came when you typed “Dear …”.

Page 23: 1 Polite Computing Software that respects the user Brian Whitworth © 2002, bwhitworth@acm.org.

© Brian Whitworth 2005

[email protected]

23

Die Clippy Die! According to a 2001 PC Magazine survey,

Mr. Clippy was the third biggest software flop of the year, with same concept Microsoft Bob as the first (PC Magazine, 2001)

Chris Pratley, a Microsoft designer asks “If you think the Assistant idea was bad, why exactly?”

If Microsoft and other designers have not yet figured it out – Mr. Clippy was impolite

Page 24: 1 Polite Computing Software that respects the user Brian Whitworth © 2002, bwhitworth@acm.org.

© Brian Whitworth 2005

[email protected]

24

Polite Help Mr. Clippy broke the first rule of politeness by

preemptively taking control of the cursor. By opening a modal window and forcing a

dialogue, Mr. Clippy chose the impolite way to offer help.

The polite way is to present an optional side block, as Amazon and Google do

Offering to help (giving choice) vs Demanding to help (taking choice)

Page 25: 1 Polite Computing Software that respects the user Brian Whitworth © 2002, bwhitworth@acm.org.

© Brian Whitworth 2005

[email protected]

25

What rejection? Mr. Clippy was a selfish application.

– Close his window and he came back next time happy as ever – Choose the “Hide” option and he seemed to run away, but when

Word started again, he was right back in your world. – He was like a guest who would not leave, no matter how many

times you asked Mr. Clippy’s designers assumed they knew best (while

politeness assumes the user knows their needs best). Mr. Clippy could watch your document actions, but had

no memory whatsoever of his interaction with you. “Smart” software should be smart enough to recognize

rejection.

Page 26: 1 Polite Computing Software that respects the user Brian Whitworth © 2002, bwhitworth@acm.org.

© Brian Whitworth 2005

[email protected]

26

The Mr Clippy Lesson Despite 25,000 hours of user testing, Mr. Clippy was

so notable a failure that his removal was a Windows XP sales pitch

By the usability theories of the day, Mr. Clippy should have been a slam-dunk winner. He had multi-media animation and Bayesian logic.

None of this made him any the less rude - Mr. Clippy was a know-it-all who took over, and did not listen.

The failure was not of friendliness, cleverness or usefulness.

It was a failure of politeness in design.

Page 27: 1 Polite Computing Software that respects the user Brian Whitworth © 2002, bwhitworth@acm.org.

© Brian Whitworth 2005

[email protected]

27

Operating System Support Like citizens in a society, most computer

applications are useful, some are idle, but a few are thieves who abuse common resources

“Disorder” occurs when social parties act by what they can do, not what they should do

Software disorder occurs when software “might” prevails over user “right”.

We need the operating system “Sheriff” to maintain order

If the operating system can protect its kernel from applications, it can do the same for users

Page 28: 1 Polite Computing Software that respects the user Brian Whitworth © 2002, bwhitworth@acm.org.

© Brian Whitworth 2005

[email protected]

28

PC Disorder Social disorder causes instability Windows degrades over time due to the “freedom”

applications have– Programs put files wherever they like– Uninstalled applications are not removed cleanly.

Over time, Windows becomes bloated by a “residue” of left-over files and registry records.

Eventually, only reinstalling the entire operating system (and reinstalling all applications and resetting all preferences), recovers system performance.

Page 29: 1 Polite Computing Software that respects the user Brian Whitworth © 2002, bwhitworth@acm.org.

© Brian Whitworth 2005

[email protected]

29

O/S Support for choice

1. An application source registry (ASR)1. That declares the social source of every PC

resource, e.g. Adobe, Microsoft or System

2. A general meta-choice console (GMCC)1. To manage meta-choices (choices about

choices)

Page 30: 1 Polite Computing Software that respects the user Brian Whitworth © 2002, bwhitworth@acm.org.

© Brian Whitworth 2005

[email protected]

30

An application source registry

The MSConfig Service lets users control startup applications– Names like CTSysVol don’t tell “Who?” and “Why?”, so

users could stop a system critical process by mistake An application source registry would create a source

record for each new application, and link applications to information resources. – “Source” could be a property of every desktop icon, menu

item, taskbar icon and hard drive listing. Applications could then be removed cleanly

Page 31: 1 Polite Computing Software that respects the user Brian Whitworth © 2002, bwhitworth@acm.org.

© Brian Whitworth 2005

[email protected]

31

A general meta-choice console

When Zone-Alarm asks permission it offers: 1.       Always accept 2.       Always reject 3.       Let me choose Users need only set access permissions once A GMCC would manage all choices about choices

– The GMCC Desktop tab could put back a deleted desktop icon

– An application that insisted on putting icons on the desktop every update could be denied.

Page 32: 1 Polite Computing Software that respects the user Brian Whitworth © 2002, bwhitworth@acm.org.

© Brian Whitworth 2005

[email protected]

32

Politeness & Security OK, politeness is valid, but security comes first –

then politeness– If so, politeness will never come – Politeness and security are two sides of the same coin of

social health. By analogy, a gardener defends his or her crops from

weeds, but does not wait for every weed to be killed before fertilizing.

Security reduces anti-social acts, while politeness encourages social acts. Complementary forces.

Politeness reduces the causes of hacking at its source

Page 33: 1 Polite Computing Software that respects the user Brian Whitworth © 2002, bwhitworth@acm.org.

© Brian Whitworth 2005

[email protected]

33

The Alternative The unpleasant alternative to politeness is war Today, many users feel at war with their PC

– Removing what they didn’t want added– Resetting changes they didn’t want changed– Closing windows they didn’t want opened– Deleting e-mails they didn’t want to receive.

User weapons in this war include third party tools like Black Ice, SpyBot, Spam-Killer, Pop-up blocker and Zone Alarm. At download sites, these are the most popular accesses.

The user goal is to wrestle a semblance of control from selfish programs.

Page 34: 1 Polite Computing Software that respects the user Brian Whitworth © 2002, bwhitworth@acm.org.

© Brian Whitworth 2005

[email protected]

34

Polite Computing Customer conflict is not the norm of brick and

mortar businesses, and should not be so for online business.

Social-technical systems are both social and technical. Their success depends on the user response as well as the compiler response

Making choices is what computers do, but it is also what people do. To avoid choice conflict, software must be polite.

That people control their computers, not the reverse, is a non-negotiable HCI requirement.

Page 35: 1 Polite Computing Software that respects the user Brian Whitworth © 2002, bwhitworth@acm.org.

© Brian Whitworth 2005

[email protected]

35

A Seal of Politeness Software designers should not

underestimate the importance of choice to people.

In human history, freedom and choice have been the stuff of revolutions

A grass-roots Internet movement against impolite software is not inconceivable.

Perhaps a “seal of politeness” could credit those designers who respect user choices

Page 36: 1 Polite Computing Software that respects the user Brian Whitworth © 2002, bwhitworth@acm.org.

© Brian Whitworth 2005

[email protected]

36

Summary Impolite software acts preemptively, hides

itself, confuses users and forgets past choices

Polite software allocates resources with permission, discloses itself and its source, enables easy and simple choices, and remembers past interactions.

Page 37: 1 Polite Computing Software that respects the user Brian Whitworth © 2002, bwhitworth@acm.org.

© Brian Whitworth 2005

[email protected]

37

Final Word

Polite acts

Legitimate acts

Criminal acts

Social Benefit

Selfish Benefit

Giving Choice

Taking Choice

Where in the above space does your software fit?

Page 38: 1 Polite Computing Software that respects the user Brian Whitworth © 2002, bwhitworth@acm.org.

© Brian Whitworth 2005

[email protected]

38

ENDSee brianwhitworth.com for example papers: 1. Polite Computing2. The Web of System Performance3. Spam and the Social-Technical Gap4. Legitimate by design5. Voting before discussing6. Generating agreement in computer-mediated

groups