All posts filed under “Lock-in

Eight design patterns for errorproofing

Eight design patterns for errorproofing

Go straight to the patterns One view of influencing user behaviour – what I’ve called the ‘errorproofing lens’ – treats a user’s interaction with a system as a set of defined target behaviour routes which the designer wants the user to follow, with deviations from […]

comments 6
Swoopo: Irrational escalation of commitment

Swoopo: Irrational escalation of commitment

Swoopo, a new kind of “entertainment shopping” auction site, takes Martin Shubik’s classic Dollar Auction game to a whole new, automated, mass participation level. It’s an example of the escalation of commitment, or a sunk cost fallacy, where we increase our commitment (in this case […]

comments 27
Digital control round-up

Digital control round-up

Mac as a giant dongle At Coding Horror, Jeff Atwood makes an interesting point about Apple’s lock-in business model: It’s almost first party only– about as close as you can get to a console platform and still call yourself a computer… when you buy a […]

comment 1
Persuasion & control round-up

Persuasion & control round-up

New Scientist: Recruiting Smell for the Hard Sell Samsung’s coercive atmospherics strategy involves the smell of honeydew melon: THE AIR in Samsung’s flagship electronics store on the upper west side of Manhattan smells like honeydew melon. It is barely perceptible but, together with the soft, […]

comments 6
Biting Apple

Biting Apple

Interesting to see the BBC’s summary of the current iPhone update story: “Apple issues an update which damages iPhones that have been hacked by users”. I’m not sure that’s quite how Apple’s PR people would have put it, but it’s interesting to see that whoever […]

comments 8
Dishonourable discharge?

Dishonourable discharge?

Long overdue, I’m currently reading Bruce Schneier‘s excellent Beyond Fear, and realising that in many ways, security thinking overlaps with architectures of control: the goal of so many systems is to control users’ behaviour or to deny the user the ability to perform certain actions. […]

comments 5
Another charging opportunity?

Another charging opportunity?

Last month, an Apple patent application was published describing a method of “Protecting electronic devices from extended unauthorized use” – effectively a ‘charging rights management’ system. New Scientist and OhGizmo have stories explaining the system; while the stated intention is to make stolen devices less […]

comments 13
Bad profits

Bad profits

The Gillette Sensor Excel not only comes with a dummy blade, it also only comes with two out of five possible blade slots filled. Images from Sevenblock on Flickr. The razor-blade model in general is something of an old chestnut as far as architectures of […]

comments 7
A bright idea?

A bright idea?

UPDATE: See this more recent post for information and photos of how to get a 2-pin bulb to fit in a BC3 fitting. This may well be the example which involves the most different ‘architecture of control’ issues so far – by a long way. […]

comments 54
Useful terminat-ology

Useful terminat-ology

Image from Black Flag website. Sometimes there’s very useful terminology in one field, or culture, which allows clearer or more succinct explanation of concepts in another. In the UK we don’t have Roach Motels. There are doubtless similar products, but they don’t have such a […]

comments 3