fullrecord |
[{"key": "dc.contributor.advisor", "value": "Clements, Kati", "language": "", "element": "contributor", "qualifier": "advisor", "schema": "dc"}, {"key": "dc.contributor.author", "value": "Salovaara, Olli", "language": "", "element": "contributor", "qualifier": "author", "schema": "dc"}, {"key": "dc.date.accessioned", "value": "2022-06-23T06:48:15Z", "language": null, "element": "date", "qualifier": "accessioned", "schema": "dc"}, {"key": "dc.date.available", "value": "2022-06-23T06:48:15Z", "language": null, "element": "date", "qualifier": "available", "schema": "dc"}, {"key": "dc.date.issued", "value": "2022", "language": "", "element": "date", "qualifier": "issued", "schema": "dc"}, {"key": "dc.identifier.uri", "value": "https://jyx.jyu.fi/handle/123456789/82004", "language": null, "element": "identifier", "qualifier": "uri", "schema": "dc"}, {"key": "dc.description.abstract", "value": "T\u00e4m\u00e4 kandidaattitutkielma on toteutettu kirjallisuus katsauksena ja tutkielmassa k\u00e4sitell\u00e4\u00e4n harhaanjohtavia suunnittelumalleja ja niiden k\u00e4ytt\u00e4j\u00e4kokemukseen. Tutkielman tarkoituksena on vertailla eri harhaanjohtavan suunnittelumalleja, sek\u00e4 informoida lukijaa k\u00e4ytt\u00f6j\u00e4rjestelmien suunnitelluista, ongelmista ja vaaroista. T\u00e4m\u00e4n lis\u00e4ksi tutkielmassa tuodaan esille, mit\u00e4 k\u00e4ytt\u00e4j\u00e4kokemuksen piirteit\u00e4 hy\u00f6dynnet\u00e4\u00e4n mink\u00e4kin harhaanjohtavan mallin toteutuksessa. Tutkielmassa esitet\u00e4\u00e4n tarkemmin eri harhaanjohtavia suunnittelumalleja, sek\u00e4 pyrit\u00e4\u00e4n luokittelemaan ne omiin strategisiin kategorioihin. Kategorisoinnin lis\u00e4ksi tutkielmassa pyrit\u00e4\u00e4n avaamaan syit\u00e4, miksi harhaanjohtavat suunnittelumallit toimivat, sek\u00e4 mik\u00e4 kognitiivinen harha on mallin takana. \nTutkielman l\u00e4hdemateriaali on haettu JYKDOK:ista ja Google Scholarista, sek\u00e4 l\u00e4hteit\u00e4 on vertaisarvioitu Julkasufoorumin avulla. Tutkielman toteutuksessa on painotettu uusia ja asiaan kuuluvia l\u00e4hteit\u00e4. L\u00e4hteiden etsimisess\u00e4 on k\u00e4ytetty hakusanoja \u201ddeceptive design\u201d, \u201ddark patterns\u201d, \u201duser experience\u201d, \u201dUX\u201d, \u201ddesign model\u201d ja \u201dcognitive deception\u201d. N\u00e4iden menetelmien ja tutkittujen l\u00e4hteiden avulla on pyritty vastaamaan seuraavaan tutkimuskysymykseen: Millainen vaikutus harhaanjohtavilla suunnittelumalleilla on k\u00e4ytt\u00e4j\u00e4kokemukseen? \nKirjallisuuskatsauksen perusteella kaikki harhaanjohtavat suunnittelumallit vaikuttavat k\u00e4ytt\u00e4j\u00e4kokemukseen negatiivisesti. Kuitenkaan monia malleja k\u00e4ytt\u00e4j\u00e4 ei itse huomannut k\u00e4ytt\u00f6tilanteessa, tai k\u00e4ytt\u00e4j\u00e4 ei huomaa, ett\u00e4 h\u00e4nt\u00e4 johdetaan harhaan ja huijataan. Vaikutus k\u00e4ytt\u00e4j\u00e4kokemukseen ei siis ole v\u00e4ltt\u00e4m\u00e4tt\u00e4 \u00e4killist\u00e4. Tutkielmassa esitet\u00e4\u00e4n eri mallien vaikutukseksi k\u00e4ytt\u00e4j\u00e4kokemukseen esimerkiksi pakotettuja toimintoja, est\u00e4mist\u00e4, h\u00e4irint\u00e4\u00e4, salailua ja muita tekij\u00f6it\u00e4, jotka vaikeuttavat k\u00e4ytett\u00e4vyytt\u00e4 ja sen seurauksena vaikuttavat negatiivisesti k\u00e4ytt\u00e4j\u00e4kokemukseen. Eri l\u00e4hteist\u00e4 k\u00e4vi ilmi, ett\u00e4 useissa harhaanjohtavissa suunnittelumalleissa k\u00e4ytet\u00e4\u00e4n k\u00e4ytt\u00e4j\u00e4kokemusta ja sen piirteit\u00e4 toteutus keinona. Oletukset, \u00e4rsykkeet, tottumukset, johdattaminen ja harhauttaminen toteutui hy\u00f6dynt\u00e4m\u00e4ll\u00e4 k\u00e4ytt\u00e4j\u00e4n psykologisia vaikutteita ja kognitiivisia harhoja. Harhaanjohtavien suunnittelumallien tarkoituksena johdattaa k\u00e4ytt\u00e4j\u00e4\u00e4 ja luomaan tilanteita, miss\u00e4 k\u00e4ytt\u00e4j\u00e4 saattaisi tehd\u00e4 virheen, mist\u00e4 suunnittelija hy\u00f6tyisi. Kognitiivisien harhojen avulla suunnittelijat johdattavat k\u00e4ytt\u00e4ji\u00e4 harhaan.", "language": "fi", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.abstract", "value": "This bachelor thesis is conducted as a literature review and the thesis discusses deceptive design patterns and their impact on user experience. The purpose of the thesis is to compare different deceptive design models and to inform the reader about the design, problems and dangers of operating systems. In addition, the thesis will highlight which user experience features are used in the implementation of which deceptive design. The thesis further details the different deceptive design models and attempts to classify them into their own strategic categories. In addition to the categorization, the thesis aims to open up the reasons why misleading design models work, as well as the cognitive bias behind the model. \n \nThe source material for the thesis has been retrieved from JYKDOK and Google Scholar, and the sources have been peer-reviewed using the JUFO. The emphasis has been placed on new and relevant sources. The keywords \"deceptive design\", \"dark patterns\", \"user experience\", \"UX\" and \"design model\" have been used to search for sources. These methods and the sources examined have been used to answer the following research question: What is the impact of deceptive design models on user experience? \n \nThe literature review shows that all misleading design models have a negative impact on user experience. However, many of the designs are not noticed by the user in the situation of use, or the user does not realize that they are being misled and deceived. The impact on user experience is therefore not necessarily sudden. The thesis presents the impact of different models on user experience, for example, forced actions, blocking, harassment, secrecy, and other factors that impede usability and consequently negatively affect the user experience. Various sources revealed that a number of misleading design models use user experience and its features as a means of implementation. Assumptions, stimuli, habits, induction, and deception were implemented by exploiting the psychological influences and cognitive biases of the user. Deceptive design models are intended to mislead the user and create situations where the user might make a mistake that would benefit the designer. Designers use cognitive biases to mislead users.", "language": "en", "element": "description", "qualifier": "abstract", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Submitted by Miia Hakanen (mihakane@jyu.fi) on 2022-06-23T06:48:15Z\nNo. of bitstreams: 0", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.description.provenance", "value": "Made available in DSpace on 2022-06-23T06:48:15Z (GMT). No. of bitstreams: 0\n Previous issue date: 2022", "language": "en", "element": "description", "qualifier": "provenance", "schema": "dc"}, {"key": "dc.format.extent", "value": "31", "language": "", "element": "format", "qualifier": "extent", "schema": "dc"}, {"key": "dc.language.iso", "value": "fin", "language": null, "element": "language", "qualifier": "iso", "schema": "dc"}, {"key": "dc.rights", "value": "In Copyright", "language": "en", "element": "rights", "qualifier": null, "schema": "dc"}, {"key": "dc.subject.other", "value": "harhaanjohtava suunnittelu", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "tummat kuviot", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "antimallit", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "k\u00e4ytt\u00e4j\u00e4kokemus", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.subject.other", "value": "k\u00e4ytt\u00e4j\u00e4kokemuksen suunnittelu", "language": "", "element": "subject", "qualifier": "other", "schema": "dc"}, {"key": "dc.title", "value": "Harhaanjohtava suunnittelu & k\u00e4ytt\u00e4j\u00e4kokemus", "language": "", "element": "title", "qualifier": null, "schema": "dc"}, {"key": "dc.type", "value": "bachelor thesis", "language": null, "element": "type", "qualifier": null, "schema": "dc"}, {"key": "dc.identifier.urn", "value": "URN:NBN:fi:jyu-202206233608", "language": "", "element": "identifier", "qualifier": "urn", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Bachelor's thesis", "language": "en", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.type.ontasot", "value": "Kandidaatinty\u00f6", "language": "fi", "element": "type", "qualifier": "ontasot", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Informaatioteknologian tiedekunta", "language": "fi", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.faculty", "value": "Faculty of Information Technology", "language": "en", "element": "contributor", "qualifier": "faculty", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Informaatioteknologia", "language": "fi", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.department", "value": "Information Technology", "language": "en", "element": "contributor", "qualifier": "department", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "Jyv\u00e4skyl\u00e4n yliopisto", "language": "fi", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.contributor.organization", "value": "University of Jyv\u00e4skyl\u00e4", "language": "en", "element": "contributor", "qualifier": "organization", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Tietoj\u00e4rjestelm\u00e4tiede", "language": "fi", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "dc.subject.discipline", "value": "Information Systems Science", "language": "en", "element": "subject", "qualifier": "discipline", "schema": "dc"}, {"key": "yvv.contractresearch.funding", "value": "0", "language": "", "element": "contractresearch", "qualifier": "funding", "schema": "yvv"}, {"key": "dc.type.coar", "value": "http://purl.org/coar/resource_type/c_7a1f", "language": null, "element": "type", "qualifier": "coar", "schema": "dc"}, {"key": "dc.rights.accesslevel", "value": "openAccess", "language": null, "element": "rights", "qualifier": "accesslevel", "schema": "dc"}, {"key": "dc.type.publication", "value": "bachelorThesis", "language": null, "element": "type", "qualifier": "publication", "schema": "dc"}, {"key": "dc.subject.oppiainekoodi", "value": "601", "language": "", "element": "subject", "qualifier": "oppiainekoodi", "schema": "dc"}, {"key": "dc.subject.yso", "value": "suunnittelu", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "k\u00e4ytett\u00e4vyys", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.subject.yso", "value": "k\u00e4ytt\u00e4j\u00e4kokemus", "language": null, "element": "subject", "qualifier": "yso", "schema": "dc"}, {"key": "dc.rights.url", "value": "https://rightsstatements.org/page/InC/1.0/", "language": null, "element": "rights", "qualifier": "url", "schema": "dc"}]
|