Need peaceful screen time negotiations?

Get your FREE GKIS Connected Family Screen Agreement

reply all

Have You Been Suckered Online by a Dark Pattern?

Persuasion plays a big role in our interaction with the world and the people around us. We persuade our friends to watch our favorite movie with us and are persuaded to elect a new president. Some manipulations are transparent. Others are well-thought-out psychological hidden tricks to make easy money. With the rise of technology, methods of manipulation and persuasion are commonly used. From advertisements to get you to buy products to being kept in the dark about what the company promises you, these methods of manipulation are known as dark patterns.

What are dark patterns?

Dark patterns are persuasive techniques used by companies to trick people into buying and signing up for things.

The term dark pattern was coined by Harry Brignull, a cognitive scientist.[1] He describes dark patterns as, “A user interface that has been carefully crafted to trick users into doing things. they are not mistakes. They are carefully crafted with a solid understanding of human psychology, and they do not have the user’s interest in mind.”[2]

Why do companies use dark patterns?

The Internet is a business platform. Websites are designed to capture your attention. To stay competitive, companies must have offers that set them apart, like the end-cap items at the grocery store.[3]

Intentional product placement forces customers to view more expensive merchandise on their way to grab their everyday purchases. Online websites have similar methods of forcing users to see attractive products.

Dark patterns come in many different styles, all with the same intention of keeping the misleading strategy somewhat hidden. Sometimes, dark patterns can be illegal. Brignull says, “Many designers, and possibly even most, hate using dark patterns in their work, but they are forced to implement them by managers. These managers only care about one or two individual metrics, not the experience of the site or brand as a whole. So, a manager who is tasked with increasing the number of people who sign up for a company’s newsletter might order a website designer to use a dark pattern to capture email addresses, because it’s an easy short-term solution that doesn’t require any effort.”[4]

Types of Dark Patterns from Dr. Brignull’s website, darkpatters.org. 

Bait & Switch

The bait and switch technique refers to the act of advertising a ‘too good to be true’ price that is not stocked. By grabbing the customer’s attention, the chances of purchasing an alternatively higher-priced item go up.

Disguised Ad

Disguised ads are advertisements designed to appear like the content the user was searching for, so they’ll mistakenly click on them. They are typically presented to people during informational searches.

Forced Continuity

The forced continuity dark pattern is used when a company offers a free trial period. The company holds the customer responsible for unsubscribing from the free trial period, otherwise charging them for their subscription.

Obstruction

Obstruction refers to the strategy of making a particular task more difficult than it needs to be. The intent is to frustrate or confuse the customer so they give up before completing the task. A common obstruction is hiding the unsubscribe link or instructions, so the customer gives up and keeps on paying their monthly subscription cost.

Friend Spam

Friend Spam refers to the devious act of asking for access to your social media friends list and then spamming them with ads. The user agrees because they’re rushing through the signup process or under the impression that your friend list will be used for a desirable outcome, like finding more friends. LinkedIn was sued for $13 million in 2015 for using this dark pattern.

Hidden Costs

Hidden costs typically appear in the last step of the checkout process when the company asks for additional and unexpected charges, like delivery or shipping charges. Because the customer has already invested enthusiasm and time in the purchase, they are less likely to bail on the transition at the end of the process.

Price Comparison Prevention

This dark pattern is in play when the retailer makes it hard for the user to compare the prices of an item with another item to prevent them from making an informed buying decision.

Privacy Zuckering

Privacy Zuckering occurs when the customer is tricked into publicly sharing more information about themselves than they intended. This dark pattern was named after Facebook CEO Mark Zuckerburg because, in the company’s early years of development, Facebook made it difficult for users to control their privacy settings and easy to overshare by mistake.

Today, ‘privacy zuckering’ works more deviously, using data brokers to collect personal information that they sell to other companies.[8] These techniques were described in Facebook’s lengthy ‘terms and conditions.’ But most users won’t read them because of the overly burdensome legalese.[9]

Roach Motel

This dark pattern technique makes it easy for you to get into a certain situation but hard for you to get out of it.

An example is if a customer wants to delete their profile or content on social media but is punished with unwanted consequences if they do so (like requiring you to lose all of your photos or contacts as a penalty for deletion).

Sneak into the Basket

Sneak into the basket happens when the customer attempts to purchase something, but somewhere during their purchasing journey, an additional item appears in their basket.

Trick Question

A trick question compels you to answer thinking one thing but, if read carefully, it asks for another thing entirely.

Fear of Missing Out

This dark pattern technique is made to look like the item you’re thinking of purchasing is in high demand, pressuring you to make the decision quickly.[10]

Examples include a reminder of the number of people looking also at the specific item. The marketing technique of scarcity will alert you, “Only 3 left!” Booking hotel rooms, airplane flights, and merchandise on Amazon use this persuasive tactic to trigger your urgency and thus increase sales.

Nagging/Forced Action

A popup appears that requires action before you can move forward with your online task.

Sneaking

Sneaking refers to hiding, disguising, or delaying relevant information to force uninformed decisions.

Intentional Misdirection

Intentional misdirection is a persuasive technique that offers a promise for a free or inexpensive item, only to eventually inform you that the free item doesn’t apply to you after all, and you must purchase a different solution.

An example of this type of dark pattern is that was used by the company Turbo Tax. In this instance, Turbo Tax offered people the option to file their taxes online for free. But once in the sales funnel, customers discovered that the free option only applied to people needing to file a simple W-2 form (which is a small minority of taxpayers). Once customers purchased the paid option that applied to them, they would discover the extra $60 to $200 charges for any forms that deal with loans and mortgages.[5] That moves what looks like a free service to an unexpected paid service.

Our GKIS favorite podcast Reply All covered dark patterns in episode #144. They reported that Turbo Taxes’ second option, known as Turbo Tax-Free File/Freedom, was not advertised and the link could not be found anywhere on their website. Further, Turbo Tax-Free File was only free for people whose adjusted gross annual income was $66,000 or less.[6] When the producers searched online for TurboTax Freefile/Freedom, Google offered two options, an orange button asking if you qualify or a blue button saying “start for free.” Most people would choose the option of the blue button that offers free tax filing. But choosing the blue button takes you back to Turbo Tax-Free, where only simple forms are free. Finding TurboTax Free File was only accessible through a link from IRS.gov.[7]

How to Avoid Being Victimized by Dark Patterns

In Dr. Bennett’s book Screen Time in the Mean Time she writes, “Due to screen technology, this generation of children are more marketed to than any other children in history. Why? Because there’s BIG money in child and teen products. If you can’t see the product, you are the product.” GetKidsInternetSafe courses help parents and kids be educated consumers.

Thanks to Andrew Weissmann for his research and help with writing this article.

I’m the mom psychologist who will help you GetKidsInternetSafe.

Onward to More Awesome Parenting

Tracy S. Bennett, Ph.D.
Mom, Clinical Psychologist, CSUCI Adjunct Faculty
GetKidsInternetSafe.com

Photo Credits

Free photo 4993523 © Elliot Westacott – Dreamstime.com

Flickr- by Tony DeCruz

Flickr- by Robert3000

Gratisography- Promotion by Adobe

Flickr- by Tom Magliery

Morguefile- by Getty Images

Works Cited

[1] Theverge.com Dark Patterns: inside the interfaces designed to trick you By Harry Brignull

[2] 90percentofeverything.com by Harry Brignull

[3] Nerdwriter-youtube

[4] Fastcompany.com Why Dark Patterns Won’t Go Away ByJohn Brownlee

[5] Gimlet Replyall #144 dark patterns

[6] Irs.gov/filing/free-file-do-your-federal-taxes-for-free

[7] Gimlet Replyall #144 dark patterns

[8] Npr.org Firms are Buying, Sharing your online info. What can you do about it? By: Brian Naylor

[9] Darkpatterns.org Privacy Zuckering By Harry Brignull

[10] Infimum.co Dark Patterns Designs That Pull Evil Tricks on Our Brains By Ana Valjak

Is Facebook Spying by Hijacking Your Smartphone Mic?

Have you heard the rumor that Facebook is spying by recording your everyday conversation? Or maybe you’ve had an experience of Facebook offering a friend request after you had lunch with a shared friend? Facebook denies any form of spying. Are they being truthful or are they going behind our backs and hiding in the shadows of the Internet?

Ad Retargeting

Ad retargeting refers to a marketer using data about your browsing or buying history to advertise products you’re likely to buy.

It’s well known that Facebook and other websites participate in ad retargeting. However, stories have arisen that question how that data is being collected. One story that has been widely shared is about a couple talking about getting a cat and then, suddenly, ads for cat food appear on their Facebook profile.[1] Or the one about. a pregnant teen who was targeted for diaper and stroller ads before she even knew she was pregnant.

We’ve all been the victim of ad retargeting on Google or Facebook. For example, the other day I searched for a specific lotion from Bath & Body Works and added it to my cart. Before checking out, I closed the website to go on Facebook. JUST THEN, an ad was presented to me for the exact lotion I was waiting to purchase. Creepy!

Facebook

One of the largest social media outlets under fire regarding the invasion of privacy is Facebook. With over 2.3 billion Facebook users, this social media giant has a responsibility to protect its customers. Or do they?

In response to allegations, Facebook denied spying and claims they do not use microphone technology to listen in on our conversations.[2] Without our consent, that would be illegal.

Maybe there are different reasons why these coincidences are occurring. In psychology, we call the feeling of learning something and then noticing that the same thing appears constantly the Baader-Meinhof phenomenon.[2] In other words, it could be just your imagination and it’s truly a coincidence.

Smart Devices

Perhaps that explanation isn’t persuasive enough. There are smart devices (like televisions, refrigerators, and speakers) and even children’s toys that bend the rules of privacy and know more about us than we’d be comfortable with. Smart devices can use location, data, and even a microphone to gain personal information that is valuable to marketers.[3]

For example, smart connected toys like Talking Barbie are on the market, and parents are becoming concerned.[3] These toys not only record the sounds and conversations you home. They also store that data on a server. The doll can then respond with one of the thousands of canned responses based on an algorithm. If your daughter asks Barbie what outfit she should choose, Barbie may suggest she consider a career in fashion merchandising.

Smartwatches also raise privacy concerns.[3] For example, the Apple Health app on iPhones and Google Fit can track and collect data on your location wherever you take your phone.[4]

Smart speakers like Siri, Alexa, Echo, and Google Home are other examples of smart-connected appliances. Recent estimates are that Alexa has over 10,000 skills available.

Pixel and Digital Exhaust

The ‘liking’ and ‘sharing’ features on Facebook and other social media sites also provide important marketing data that allow those sites to more specifically target you.[5] The more they know about you, the better they can conveniently dish up items you will be compelled to buy.

Even with Facebook’s denial of privacy violations, many are still skeptical. During an episode of the podcast ‘Reply All,’ the hosts informed listeners that Facebook uses a program called Pixel. This program collects data about your online behavior and is installed on millions of websites.[6]

In fact, whenever you surf the Internet, you are followed by trackers, called digital exhaust, that collect data on your activity. This data that is very valuable to those trying to sell you something or learn about your interests and habits.

Is Facebook spying on you?

On the episode of Reply All titled, “Is Facebook Spying on you?” hosts investigated an incident where a listener was convinced Facebook listened in on her private conversation through her smartphone microphone. She reported that the same day she brought up the name of an old friend, Facebook suggested that individual as a contact.[6]

After much discussion, the listener learned that the site uses a shadow profile to access the contacts on your phone if that option is selected. The listener reasoned that since Facebook could determine her location was the same as her lunchmate, also a Facebook user, maybe the site decided they were friends and offered each of them friends from the other’s friends lists. She said it is kind of like a bird-of-a-feather-flocks-together offer.

The bottom line is that it’s almost impossible for us to anticipate how congregated (combined) data can be used to predict future behavior, and how that data might be useful to marketers.

Although most of us willingly sign over our private information in exchange for fun content, here are some ways to minimize risk.

  • Turn off the feature that tracks your location and embeds that data in your photos. For iPhone go to Settings > Privacy > Microphone and then unselect Facebook. On Android, go to Settings > Personal > Privacy > Safety > App permissions > Microphone and unselect Facebook.[2]

  • Turn off location services.

  • Avoid giving away private information.

  • Do not open or click on anything that looks suspicious.

  • Use a password generator, which is a software program or web page that will generate a one-time password for you to strengthen your cybersecurity.[8]

These tips and more can be found in my Cybersecurity and Red Flags Supplement a perfect addition to our free Connected Family Screen Agreement.

Thanks to Allie Mattina for clearing Facebook’s name, and providing us with interesting and accurate information. For more information regarding online tracking, take a look at the GKIS article “Sex Traffickers May Use Social Media to Troll Your Child. Start by Turning Off Geotagging” to learn more about how to protect your teen.

Works Cited

[1] Reply All. “Is Facebook Spying on You?” Gimlet, 2 Nov 2017.

[2] Titcomb, James. ” ‘Facebook is Listening to Me’: Why This Conspiracy Theory Refuses to Die.” The Telegraph, 30 Oct 2017.

[3] Haynes, Jessica. “Ways Your Technology is Already Spying on You.” ABC News, 7 Mar 2017.

[4] Koen, Trudy. “Your Social Media Apps are Spying on You; Here’s How to Get Your Privacy Back.” Blackberry, 20 Jun 2016.

[5] Hern, Alex. “Six Ways Your Tech is Spying On You and How to Turn it Off.” The Guardian, 10 Feb 2015.

[6] Reply All. “Year End Extravaganza.” Gimlet, 21 Dec 2017.

[8] Computer Hope. “Password Generator.” Computer Hope, 26 Apr 2017.

Photo Credits

Photo by Kai Brame on Unsplash

Photo by Oliver Thomas Klein on Unsplash

Photo by William Iven on Unsplash