Evil by Design: Design Patterns that Lead Us into Temptation (Chris Nodder)

 
0.0 (0)
Evil by Design: Design Patterns that Lead Us into Temptation (Chris Nodder)

The book Evil by Design offers a lighthearted look at how online and application design can be used to manipulate our behavior by exploiting psychological principles.

The chapters of the book are organized according to the seven deadly sins, and the pertinent design patterns are included under the titles of sloth, pride, envy, greed, lust, anger, and gluttony.

Find out how businesses persuade us to do what they want. This book combines ideas from psychology, marketing, and design to demonstrate why humans are susceptible to particular persuasive strategies. It approaches persuasive design from the dark side. It offers simple-to-understand and practical patterns for using these design techniques and is jam-packed with examples from every corner of the web. The seven deadly sins are used to organize it.

  • Pride -- use social proof to position your product in line with your visitors' values
  • Sloth -- build a path of least resistance that leads users where you want them to go
  • Gluttony -- escalate customers' commitment and use loss aversion to keep them there
  • Anger -- understand the power of metaphysical arguments and anonymity
  • Envy -- create a culture of status around your product and feed aspirational desires
  • Lust -- turn desire into commitment by using emotion to defeat rational behavior
  • Greed -- keep customers engaged by reinforcing the behaviors you desire

Ebook Details

Author(s)
About the Authors
Chris Nodder, a user researcher and expert in interaction design, was so irritated by the weak persuasive design he saw on websites that he decided to write a book on how to be good at being evil. Developers, user experience specialists, and the general public can all benefit from reading Evil By Design. It demonstrates how businesses employ these strategies and teach you how to resist being influenced by them. Additionally, Chris runs the website evilbydesign.info, where he welcomes you to provide your own examples of depraved user interfaces.
Published
Published Date / Year
1 edition (June 17, 2013); EvilByDesign.info (2012)
eBook Format
HTML
ISBN-10
1118422147
ISBN-13
978-1118422144

Similar Programming & Computer Books

UML For The IT Business Analyst (Howard Podeswa)
Information technology business analysts are frequently involved in OO and UML projects nowadays, but they still have a ways to go before fully utilizing the technology beyond use cases...
UML Process (Sharam Hekmat)
Using object technology, the UML Procedure is a standardized process for creating software systems. This document's goal is to define the UML Process at a level appropriate for practitioners...
Applying UML and Patterns: An Introduction to Object-Oriented Analysis and Design (Craig Larman)
This book provides a clear and useful introduction to using objects to think about and build systems that are well-built, reliable, and maintained. ...
UML Tutorial (Tutorialspoint)
Essential competencies for beginning programmers! Unified Modeling Language principles are explained in this user-friendly book (UML).  
Hacking Kubernetes: Threat-Driven Analysis and Defense (Andrew Martin, et al)
To operate your Kubernetes workloads in a secure and reliable manner, A threat-based overview of Kubernetes security is provided in this useful open-source book. ...
HTML Tutorials: Everything HTML, CSS, and JavaScript (Patrick Griffiths)
This thorough book is the greatest option for readers who wish to create Web pages that load quickly, are simple to edit, accessible to all, function on all browsers,...
Principles, Patterns and Practices of Domain-Driven Design (Scott Millett)
For experienced developers creating applications for complicated domains, this book offers the Domain Driven Design (DDD) methodology in an approachable and useful manner.
C# Design Patterns: A Tutorial (James W. Cooper)
Using some of the most popular design patterns, this book teaches you how to write C# programs. It also acts as a brief introduction to the new C# programming...
Designing Event-Driven Systems: Concepts and Patterns for Streaming Services with Apache Kafka (Ben Stopford)
In Concepts and Patterns for Streaming Services with Apache Kafka, the author discusses how you may create mission-critical systems using service-based architectures and stream processing tools like Apache Kafka....
AngularJS Fundamentals In 60-ish Minutes (Dan Wahlin)
The AngularJS framework and some of the important features it offers that make Single-Page Application (SPA) development easier are covered in this lesson. ...

Others Programming Books by Wiley Publishers

Securing Java: Getting Down to Business with Mobile Code (Gary McGraw, et al)
Security becomes more important as Java develops and enters the industry. But as Java develops, so do its security concerns and designs. ...
The Complexity of Boolean Functions (Ingo Wegener)
One of the most fascinating and crucial areas of theoretical computer science presently includes research on the difficulty of Boolean functions in non-uniform processing models. It directly relates to...
Data Structures and Algorithms with Object-Oriented Design Patterns in C++ (Bruno R. Preiss)
This free programming book gives readers a contemporary, object-oriented perspective for examining data structures and algorithms. It demonstrates how to use polymorphism and inheritance clearly and includes pieces of...
Computer Security Handbook (Seymour Bosworth, et al.)
Every aspect of our daily lives—from our computers and other linked gadgets to the wireless signals all around us—is impacted by computer security. Breach ramifications for safety, privacy, and...
Reversing: Secrets of Reverse Engineering (Eldad Eilam)
This book gives readers practical, in-depth methods for reverse engineering software, starting with a fundamental primer on the subject that covers computer internals, operating systems, and assembly language. It...
Naked Objects (Richard Pawson, et al)
A full-stack open-source application development framework called Naked Objects for Java was created to enable you to create business apps that are driven by specific domains quickly. ...
Security Engineering: A Guide to Building Dependable Distributed Systems (Gordon Fyodor Lyon)
Massively thorough and meticulously studied, Security Engineering demonstrates how challenging it is to safeguard information systems from tampering, eavesdropping, illegal usage, and general malice.
(Formerly) Analytical Network and System Administration: Managing Human-Computer Systems (Mark Burgess)
Network and system administration typically refers to the ability to maintain the smooth operation of computers and networks. But in actuality, complexity management is a necessary skill. ...
Simply Logical: Intelligent Reasoning by Example (Peter Flach)
An introduction to Prolog programming for AI that covers both fundamental and advanced AI concepts.
Digital Design with RTL Design, VHDL, and Verilog, 2nd Edition (Frank Vahid)
This book is a highly anticipated, current resource for the fundamentals of digital design.
An Introduction to ATM Networks (Harry G. Perros)
Telecommunications have been transformed by Asynchronous Transfer Mode (ATM), which is now a crucial component of networking architecture.
Financial Applications using Excel Add-in Development in C/C++ (Steve Dalton)
Any serious Excel developer should purchase this book. Excel is the de facto industry standard for financial modeling and offers a variety of techniques for users to expand the...
Mastering Enterprise JavaBeans 3.0 (Rima Patel Sriganesh, et al)
An invaluable tutorial on the dramatic changes to Enterprise JavaBeans (EJB) 3.0 EJB 3.0 boasts drastically different programming and deployment strategy from its prior iterations, with almost...
SOAAdoptionForDummies-1-58-1655572680
SOA is the most important initiative facing IT today and is difficult to grasp; this book demystifies the complex topic of SOA and makes it accessible to all those...

User reviews

There are no user reviews for this listing.
Ratings
Rate this Book
Comments