=Paper=
{{Paper
|id=None
|storemode=property
|title=None
|pdfUrl=https://ceur-ws.org/Vol-722/PINC2011Proceedings.pdf
|volume=Vol-722
}}
==None==
!
!"#$%&''!
!
!"#$%%&'()*+#,+-.%+!
!!"!!"#$%"'("&)*+(%,-.(/*("*
!"#$%&$'()*+,%-."*+/)01%")2"*+&)-+
!"#$%&"'()*$"+,*(-".&/#(0#1&%#2!
!
!"#$%&'($)"*+",-./011"
"
"
"
2+("3*4"/011"5"6*78$9:;%<",*7*=*"
!
"#$%&'()*!+,!
!
>*%?'*"@'A*BC$A8(?*%"D"3*E"FG"H?A'$7"
"#$#%&!'($&%)*$+,(!-&*.(,/,0+&1!2)3!
4,56#$&%!7*+&(*&8!79)(1&)!:(+;&%1+$?!@AA!
B6C&1/)53,/*.+)%8!5C/C9+/1,(DE19)(1&)C)*C#F!
!
.*7"I*&A;4"
G)H&+%)!'($&%)*$+;&!-&*.(,/,0+&1!'(1$+$#$&!
:(+;&%1+H)H&!H)!G)H&+%)!
4)56#1!:(+;&%1+$I%+,!H)!A&($&)H)!
"#(*.)/8!JKKKLMJK8!A,%$#0)/!
+)(E#5)C6$!
!
!7?7="J;4"
N4'!'(1$+$#$&!
4)%(&0+&!G&//,(!:(+;&%1+$;&C!
A+$$13#%0.8!A>!PO?PMLM@JP!
)(+(HE*1C*5#C&H#"
" "
!"##$%&'(')'*"+,-.'
!"#$%&%%'%% ()$%*+#,$-.$/%0)1223-#%(4155$67%*-%*,83$-.%93:25"6%(1%!41;3/$%
0)122$4:%<3.)%=1-'>8;31+:%!41/+?.%@-A14,".31-%
!"#$%&'()$*+&,+$-+.#&/+&01$+#($2,"##1$3"41'56$
%
!"#$%B%'%% !$4:+":31-%@-'03.+7%0)1223-#%A14%C$"5.)6%D11/%3-%0+2$4,"4E$.:%
7.1$-+..18+,1)$9&/+1.$%6$:/",$+#($;"$<&+#6%
%
!"#$%FF%'%% (1<"4/:%"%G1835$%*2253?".31-%.1%H4$".$%0$/$-."46%*<"4$-$::%
=&>5$=1.1&>#51)$?+'0$*+#$@+.01'1#$+#($!+#$A&1/8"BB6%
%
!"#$%FI%'% G>=*JH*7%*%!$4:+":3;$%!$4:1-"5%G1-3.143-#%06:.$,%.1%0+2214.%
G"-"#$,$-.%1A%K3215"4%93:14/$4%
=+C'&1.+$9+'DE$+#($!+/"C$%+'('+F6%
!"##$%&'/')'0-.$1#'
!"#$%FL%'% K+35/3-#%!$4:+":31-%!41A35$:%3-%.)$%M35/7%N:3-#%G1835$%9$;3?$:%":%
@/$-.3A3$4:%
9+E'&05$-+G01%
%
!"#$%O&%'%% =+/#3-#%N:$4:%(1<"4/:%!43;"?6%1-%G1835$%9$;3?$:%
31C1DD+$%+.1C+/")$H1('"$I1"#)$@+J&F$?.FE8&F1(&)$H+0'&D/$-1..1K)$
!"#+08+#$9E4+#)$?.155+#('"$?DLE&50&)$I"''&1$M'+#"'$+#($;"'F+#$
:+(186%
%
!"#$%OB%'%% D41,%P.)3?:%.1%Q"5+$:%3-%.)$%9$:3#-%1A%G1835$%!@=H%
!+#10$A+,&5R%
%
!"#$%&F%'%% >2214.+-3.3$:%"-/%H)"55$-#$:%3-%G3-3-#%K$)";314"5%P?1-1,3?:%.1%
9$:3#-%!$4:+":3;$%($?)-151#6%
9$-KE#4$I116%
!"##$%&'2')'0&"345'
!"#$%&I%'%% S".)$43-#%"-/%!4$:$-.3-#%01?3"5%D$$/8"?E%.1%H)"-#$%91,$:.3?%
P5$?.43?3.6%H1-:+,2.31-%
9+0081N$:0E(.1K)$:&F"#$M8+FC1'5)$3E08$3100&1$+#($-1,$%E'D81..6%
%
!"#$%&L%'%% (1<"4/:%P#1?$-.43?%D+$5%PAA3?3$-?6%D$$/8"?E%
<&+4"$M+F+D8")$O&.&G1$PE+.)$9&D81..1$:D"00)$*+55&.&5$-"50+/"5$+#($Q+#$
7+/.1K6$
$
!"#$%T&%'%% H4$".3-#%UH115V%G1835$%($?)-151#3$:%(1%J$/+?$%($$-%P-$4#6%N:$%
A+#&1.$O&00"#)$!+#10$31+()$3E551..$%1+.1)$%1#$M"N+#$+#($2E/+#4$=E"6$
%
!"#$%TB%'%% =+/#3-#%!$125$%".%M14E%"-/%>.)$4%()34/'!"4.6%W1?".31-:R%
9+R$I6$S&.5"#)$A1'1/$O"501')$:8+E#$I+N5"#$+#($:&F"#$T((&5"#%
%
The Augmented Shopping Trolley: An Ambient Display To
Provide Shoppers with Non-Obvious Product Information
Jon Bird, Vaiva Kalnikaité and Yvonne Rogers
Pervasive Interaction Lab
The Open University
Milton Keynes, MK7 6AA, UK
{j.bird, y.rogers}@open.ac.uk, vaivak@gmail.com
ABSTRACT information about the global consequences of their
The Augmented Shopping Trolley consists of an ambient consumer decisions [2]. Our goal is to provide ‘non-
handlebar display connected to a scanner. When a shopper obvious’ nutritional, ethical and environmental product
scans an item the handlebar lights up to provide them with information, that is, information that is not immediately
information about the product, such as its nutritional, obvious from an item’s packaging or label, in a form that is
ethical or environmental attributes, that are not obvious as salient as the features that typically inform consumers’
from its packaging or label. The system is designed to decision making. The Augmented Shopping Trolley (Figure
seamlessly integrate with a shopping experience: it uses 1) is designed so that it fits as seamlessly as possible into a
familiar supermarket technologies; it keeps both of a supermarket shopping experience. We use familiar
shopper’s hands free; and the simple ambient display supermarket technologies: augmenting a standard shopping
facilitates the ‘fast and frugal’ decision-making typically trolley by attaching a scanner and embedding an ambient
observed in a supermarket. Our initial lab-based study display in the handlebar. This gives our system two
shows that the display can be understood at a glance and advantages over using mobile devices to provide product
used to select items based on a product’s nominal properties information. First, the trolley scanning technology is faster
(for example, it is organic), ordinal properties (for example, [4] and second, because the ambient display is built into the
it has low, medium or high food miles), as well as a trolley handlebar a customer’s shopping experience is not
combination of the two at the same time. Where as usability disrupted by having to repeatedly access and store a mobile
was the focus of our initial design, ethical issues have come display. Underhill [10, see chapter 4] emphasizes the
to the fore as we develop the system for use in importance of having both hands free during shopping.
supermarkets and we discuss how these are influencing our
design.
Author Keywords
Persuasive technologies, ambient display, shopping,
product information, ethics.
ACM Classification Keywords
H5.m. Information interfaces and presentation (e.g., HCI):
Miscellaneous.
INTRODUCTION
In a supermarket, shoppers tend to make snap judgments
based on just a few salient cues (low price, recognized
brand and attractive packaging) and they rarely take time to
read product information labels [7]. However, recent Figure 1. The Augmented Shopping Trolley display consists of
consumer surveys indicate that shoppers want more 16 LEDs embedded in the handlebar, each of which can be set
to green, red or orange
Permission to make digital or hard copies of all or part of this work for Our approach to designing an effective ambient display,
personal or classroom use is granted without fee provided that copies are first outlined in [9], is motivated by studies of ecological
not made or distributed for profit or commercial advantage and that copies
bear this notice and the full citation on the first page. To copy otherwise, rationality which investigate how people make reasonable
or republish, to post on servers or to redistribute to lists, requires prior decisions given the constraints of limited time, information
specific permission and/or a fee. and computational resources that characterize most real
Copyright © 2011 for the individual papers by the papers' authors. world situations [6, 8]. This research indicates that most
Copying permitted only for private and academic purposes. This volume
is published and copyrighted by the editors of PINC2011..
natural decision making is made on the basis of ‘fast and (idle state) to a half second sweeping movement of orange
frugal’ heuristics – short-cut strategies where people ignore that indicates scanning is in progress. There is then a beep,
most of the available data and instead focus on the most as typically heard at a checkout counter, to signal that
useful information and process it quickly. Often people scanning is completed and the display then changes to a
make a decision based on a single reason as this strategy is new state that provides relevant information about the
quick and simple and avoids having to weigh up trade-offs product. If the display is configured to show a nominal
between multiple and potentially conflicting options. This property of the product, then it flashes green if the property
approach is not rational in certain environments, namely, is present and shows the idle state if it is not. If the display
those where available pieces of information are is providing ordinal information about the product, the
approximately equally useful. However, in a shopping display employs a bar graph metaphor, with the number of
environment, the distribution of information usefulness is red pixels indicating the degree to which an item has a
highly skewed, that is, the most useful piece of information property. Specifically, if an item has a low degree of a
is a lot more important than the second most useful, which property then pixels 1-3 turn red and 4-16 turn green; if
in turn is considerably more important than the third, etc. medium then pixels 1-8 turn red and pixels 9-16 turn green;
Our handlebar ambient display consists of just sixteen and pixels 1–13 turn red and 14-16 turn green if the item
LEDs. When a shopper scans a product, a few pieces of has a high degree of a particular property. Finally, both
non-obvious information, such as whether it contains nuts, these representations can be combined to show the value of
is fair trade or has low food miles, are displayed as a salient a nominal and an ordinal property at the same time. In our
pattern on the display. study, after a participant selected or discarded an item, the
display changed back to the all green idle state.
Given that information salience influences a person’s
behaviour unconsciously [1], rather than through rational
LAB-BASED SYSTEM EVALUATION
reflection, this raises ethical concerns about the Augmented 5 adults (1 female, 4 male, aged between 20 and 40) took
Shopping Trolley, chief of which is that this system could part in a lab-based evaluation of the Augmented Shopping
potentially manipulate people into behaving in ways that Trolley. Each participant completed 12 shopping scenarios
they would not otherwise do, and furthermore, that they where they were asked to pick up and scan 5 items of a
might not be aware that they had been manipulated. This particular product type and only select those items that met
concern, and also issues to do with privacy and clarifying specified criteria. A scanner was attached to the shopping
how our system benefits shoppers, form the ethical trolley (Figure 1) but was non-functional and the handlebar
considerations that are influencing how we deploy the display was changed using a Wizard of Oz methodology.
Augmented Shopping Trolley in a supermarket.
On the basis of the changes in the patterns on the handlebar
The paper is structured as follows: first, we describe the
display, participants had to decide whether to select the
display hardware and how it conveys product information; item and place it in their trolley or discard it and place it on
second, we describe a lab-based evaluation of the system an adjacent table. Since this was an exploratory study, we
that demonstrates the efficacy of the ambient handlebar were intentionally vague about the operation of the ambient
display for conveying non-obvious product information; display as we wanted to see whether participants could
and third, we describe the ethical issues that are informing understand it intuitively. We only told participants that the
the development of the system for use in supermarkets. display patterns would change depending on whether a
product had a specific property (yes/no), the degree to
AMBIENT HANDLEBAR DISPLAY DESIGN
which a product had some property (high/medium/low) or a
The handlebar display was designed to provide shoppers
combination of the two. Participants were allowed to scan
with salient and easy to read information about a scanned
the items as many times as they wanted and in any order,
product’s nominal properties (for example, whether it is
before they made their decision about whether to select a
organic or contains nuts), its ordinal properties (for
particular item. We used 4 product types: milk; breakfast
example, if it has low, medium or high food miles), as well
cereal; wine; and juice. Each shopping scenario used one of
as a combination of the two at the same time. We
the product types and participants were asked to select from
constructed the display by attaching 16 bicolour LED units
5 different items. For example, select those bottles of wines
to a piece of wood inside a transparent plastic tube (Figure
that meet the specified criterion (fair trade) and put them in
1). This replaced the plastic handlebar in a standard
the trolley, and place the others on the discarded items
shopping trolley. The LEDs are controlled using 2
table. Each of the items was a real product but we masked
TLC5940 chips (Texas Instruments) that are driven by an
any product information on the packaging and told
Arduino microcontroller. In our lab-based study this is
participants to only use the handlebar display to decide
attached via a USB cable to a laptop running a Processing
whether they should select an item or not. The experimenter
application. Each LED unit can be set to red, green or
playing the Wizard of Oz role sat at a table on which the 20
orange (when both the green and red LEDs are on). Each
shopping items were grouped by product type. Each item
time a product is scanned, the display changes in the
was individually numbered so that the experimenter could
following way. First, it goes from an all green background
change the display appropriately when the participants use and were able to quickly read it even though they were
scanned a particular item. not given explicit information on the meaning of the display
patterns. Only two participants scanned items more than
In the first 4 shopping scenarios the handlebar display
once and this was exploratory activity at the beginning of
indicated whether a scanned item had a particular nominal
the evaluation when they were seeing how the interface
property or not: whether a milk product was organic;
worked.
whether a breakfast cereal contained nuts; whether a bottle
of wine was fair trade; and whether a carton of juice
ETHICAL ISSUES AND FURTHER DEVELOPMENT
contained added sugar. In 2 of these scenarios the
Whereas usability issues informed our initial design, ethical
participants had to select items that had a particular
considerations are shaping the development of the
property and in the other half they had to discard items if Augmented Shopping Trolley for use in supermarkets. This
they had a particular property. For example, in the first is because our ambient display not only provides salient
shopping scenario participants had to select a milk product product information for shoppers, but also potentially
if it was organic and discard it if it was non-organic; in the influences what they purchase. The use of persuasive
second shopping scenario participants had to select a technologies raises ethical concerns for many people. For
breakfast cereal if it did not contain nuts and discard it if it example, Page and Kray [3] used an online questionnaire to
did. investigate people’s views on the ethics of using persuasive
In the next stage of the evaluation, the participants technologies to encourage healthy living. 72 participants
completed 4 shopping scenarios where the display indicated rated the ethical acceptability of a number of different
whether a product contained a low, medium or high value scenarios which varied in 3 different factors: whether a
of a particular ordinal property. The task was to select items participant chose to use the technology or an external
that had a specified property to a particular degree. agency initiated its use; whether there was a clear benefit
Specifically, participants were asked to select milk with a for the participant or not; and the technology used (text
medium fat content, cereals with a high sugar content, wine messages to the participant’s mobile phone; public
with low food miles and juice with a medium water content. announcements in the participant’s location; Facebook
In none of these scenarios were participants asked to messages; restrictions on the participant’s bank account;
discard items if they had properties of a particular degree. and electric shocks). The results indicated that the majority
The final 4 shopping scenarios tested whether participants of the participants viewed the use of persuasive
could understand the display when it simultaneously technologies in most of the questionnaire scenarios as
showed information about both a nominal and an ordinal unethical. When there was no clear benefit to the
property of a scanned item. Participants were asked to participant, mobile phone were considered the most ethical
select milk that was organic and low fat, cereals that persuasive technology. However, approximately the same
contained nuts and had a medium sugar content, juice that proportion of participants (40%) considered them very
had added sugar and high water content and wine that was ethical or ethical as the proportion that considered very
not fair trade and had medium food miles. Only in the wine unethical or unethical when. A large majority of
scenario did participants have to reject items on the basis of participants found the other technologies very unethical or
information about a nominal property of the product. unethical. In scenarios where the use of a technology would
clearly benefit the participant, for example, save their life,
USABILITY RESULTS then this usage was considered slightly more ethical than
4 out of the 5 participants were able to interpret the ambient the cases where the technology did not benefit the
handlebar display and complete all the tasks without any participant. However, it is not clear whether these
mistakes. The other participant made one consistent error in differences were statistically significant. When people were
2 of the first shopping scenarios where the task was to able to freely choose whether to use a persuasive
discard items if they had a particular nominal property: they technology or not, then texts, public announcements and
selected, rather than discarded, them, but did not repeat this Facebook messages were considered ethical by the majority
error in the final shopping scenario which also required an of respondents, in comparison to the situation where the use
item to be discarded if it had a particular nominal property. of the persuasive technology was initiated by an external
Several participants reported that they found the tasks entity (for example, the UK’s National Health Service).
where they had to discard items with particular properties Electric shocks and bank account restrictions were
more difficult and it did seem to increase the cognitive load considered very unethical or unethical by the majority of
in all participants, resulting in a slightly slower response respondents, even when a participant chose to use them.
time (approximately 2 seconds, rather than 1 second for the
Page and Kray’s findings seem to concur with a central
other conditions). This could be due to the colours used in
factor identified by applied philosophical analyses of
the display: a nominal property is indicated by a green
ethical behaviour, for example, the use of persuasion in
blinking display, a colour that many people associate with
advertising [5]. Namely, the ethics of an action are
positive properties, rather than ones that should be avoided.
determined, to a large degree, by the extent to which that
All participants reported that the display was intuitive to
action impacts on an individual’s autonomy, that is, their
capacity to choose how to act and determine their own life. nominal and ordinal properties of a scanned product. Our
Page and Kray’s research also highlights that privacy and display is intuitive to use and requires no training.
the extent to which a participant benefits are important Participants find it easier to select items when they have
issues for determining the ethical acceptability of desirable properties than to not select them because they
persuasive technologies. All three of these ethical have undesirable properties. The Augmented Shopping
considerations (autonomy, privacy and benefits) are Trolley makes non-obvious nutritional, ethical and
shaping the development of the Augmented Shopping environmental product information salient to shoppers and
Trolley. facilitates the fast and frugal decision making typically used
in a supermarket. Some of the global consequences of
To ensure shopper’s autonomy, they will be free to decide
selecting particular products can now be made salient to
whether they use the Augmented Shopping Trolley and also
shoppers at the point of decision making, potentially
able to choose which particular non-obvious product
facilitating changes in consumer behaviour. We argue that
information they want to be informed about. Given that
our system is an ethical persuasive technology as it
users can configure the system to provide different product
enhances the ability of shoppers to buy choose products in
information, privacy is not compromised, even though the
accordance with their individual values.
handlebar will be visible to other shoppers, as they will not
understand what particular LED patterns mean. Some of the
REFERENCES
product information that will be provided by the 1. Cabinet Office and Institute for Government (2010)
Augmented Shopping Trolley can clearly benefit a MINDSPACE. Influencing Behaviour through Public
participant, for example, nutritional data, whereas other Policy. London: Cabinet Office.
information, such as food miles, may not have direct http://www.instituteforgovernment.org.uk/content/133/
personal benefits. In fact, trying to minimize food miles mindspace-influencing-behaviour-through-public-policy
may lead, literally, to a personal cost. However, we assume 2. EDS IDG Shopping Report 2007: Shopping Choices:
that if participants choose to be informed about a particular Attraction or Distraction?
type of product information then they do so because it is of http://www.eds.com/industries/cir/downloads/EDSIDG
Report_aw_final.pdf
benefit to them and in keeping with their lifestyle choices.
3. Page, R. E. and Kray, C. Ethics and Persuasive
We are currently considering how to use the display to Technology: An Exploratory Study in the Context of
provide aggregate information about the contents of a Healthy Living. Proceedings of the First International
participant’s trolley. The display could indicate how Workshop on Nudge and Influence in Mobile Devices,
averaged values of all the participant’s purchases relate to pp. 19-22.
some norm(s), for example, is the weekly shop below or 4. Reischach, F., Michahelles, F., Guinard, D., Adelmann,
above the average shopper’s food miles. Clearly, there are R., Fleisch, E., Schmidt, A.: An Evaluation of Product
normalization issues to be resolved to enable such Identification Techniques for Mobile Phones. In:
comparisons to be made. One ethical consideration with Proceedings of the 12th IFIP TC 13 international
Conference on Human-Computer Interaction, pp. 804--
this type of display is that even if an observer did not know
816 (2009)
what aspect of product information the aggregate display 5. Santilli, P. The Informative and Persuasive Functions of
encoded, under certain conditions it could be evident Advertising: A Moral Appraisal. Journal of Business
whether a participant was above or below a norm, thereby Ethics, 27--33, 1983.
compromising a shopper’s privacy. For example, if the 6. Simon, H. A.: Invariants of Human Behavior. Annual
observer had also used the display themselves and the Review of Psychology, 41, 1--19 (1990)
colour encoding was fixed. One way to ensure privacy is to 7. Todd, P.M.: How Much Information Do We Need?
allow participants to customize aspects of the display, such European Journal of Operational Research, 177, 1317--
as the colour encoding used. A second ethical concern with 1332 (2007)
this sort of display is that norms, like salience, typically 8. Todd, P.M., Gigerenzer, G.: Environments That Make
Us Smart: Ecological Rationality. Current Directions in
influence people unconsciously. To ensure that the
Psychological Science, 16(3), 167--171 (2007)
autonomy of participants is not compromised it seems 9. Todd, P. M., Rogers, Y. and Payne, S. J. Nudging the
important to inform them about the methods used in a Cart in the Supermarket: How much is Enough
display and how these typically influence behaviour before Information for Shoppers. In: Proceedings of
they choose to use the Augmented Shopping Trolley NIMD2010, pp. 23 – 26 (2010)
10. Underhill, P. Why We Buy: The Science of Shopping.
CONCLUSIONS Simon and Schuster: New York. 2009
Our lab-based study shows that participants can rapidly
read a shopping trolley handlebar display to determine both
Persuasion In-Situ:
Shopping for Healthy Food in Supermarkets
Ole Kallehave, Mikael B. Skov, Nino Tiainen
HCI Lab, Department of Computer Science, Aalborg University
Selma Lagerlöfs Vej 300, 9220 Aalborg East, Denmark
ole-kallehave@rocha.dk, dubois@cs.aau.dk, ninodk@gmail.com
ABSTRACT products, e.g. they cannot understand nutrition labels or
Healthy lifestyle is a strong trend at the moment, but at the how much sugar or fat the product contains [5]. Further,
same time a fast growing number of people are becoming one of the fundamental problems resides in the fact that we
over-weight. Persuasive technologies hold promising are confronted with an overwhelming number of different
opportunities to change our lifestyles. In this paper, we food products and it is often difficult to identify and choose
introduce a persuasive shopping trolley that integrates two the more healthy ones. Iyengar and Lepper showed in an
tools of persuasiveness namely reduction and suggestion. experimental study that consumers were more satisfied
The trolley supports shoppers in assessing the nutrition with their own selections when they have fewer options to
level for supermarket products and provides suggestions for select from [5]. Schwartz refers to this as the paradox of
other products to buy. A field trial showed that the choice claiming that the huge number of choices decreases
persuasive trolley affected the behaviour of some shoppers people’s real choice and decision-making [10]. Thus,
especially on reduction where shoppers tried to understand people are likely to continue their current routine type of
how healthy food products are. On the hand, the suggestion behaviour (as illustrated by Park et al. [8]) and this could
part of the system was less successful as our participants potentially prevent them from making healthier choices.
made complex decisions when selecting food. Emerging technologies are increasingly being used to alter
Author Keywords people’s opinions or behaviour, e.g. smoking cessation [4]
Shopping, health, persuasive, supermarkets. or promoting sustainable food choices [7]. Fogg refers to
such technologies as persuasive technologies or captology
ACM Classification Keywords [3]. Fogg states that contemporary computer technologies
H5.m. Information interfaces and presentation (e.g., HCI): are currently taking on roles as persuaders including
Miscellaneous. classical roles of influence that traditionally were filled by
INTRODUCTION doctors, teachers, or coaches [3]. Research studies within
Healthy lifestyles is a hot topic in most Western societies as different disciplines are increasingly concerned with such
a rapid growing number of citizens are either over-weight persuasive technologies that may be used to create or
or obese, e.g. more than 50% of the adult population in change human thought and behaviour. As examples, Chang
Denmark are either over-weight or obese [9]. Over-weight et al. [2] propose the Playful Toothbrush that assists parents
problems come from several circumstances, e.g. the lack of and teachers to motivate young children to learn thorough
exercise or unhealthy food, but in general people buy and tooth brushing skills while Arroyo et al. [1] introduce the
consume food that contains a lot of sugar or fat. Thus, we Waterbot that motivates behaviour at the sink for increased
need to alter people’s behaviour and attitude while they safety. Both these examples propose rather simple, yet
shop groceries and other food products in supermarkets. potentially powerful input and feedback that aim to inform
users of their own behaviour.
When supermarket shopping, more studies have shown that
consumer behaviour is highly controlled by routine and is Todd et al. [11] illustrate theoretically how nudging could
not simply changed or altered [8]. In fact, even if shoppers persuade shoppers to select healthy food products based on
want to change their shopping behaviour and patterns, they simplified information to the shoppers in-situ, but call for
find it difficult to understand the nutritious values of many empirical understandings of persuasive shopping. We
propose a persuasive shopping trolley application called
iCART that attempts to motivate change towards more
healthy shopping behaviour. First, we outline the idea
Copyright © 2011 for the individual papers by the papers' behind the design of the trolley application and then reports
authors. Copying permitted only for private and academic from field studies of use on its effects on behaviour change.
purposes. This volume is published and copyrighted by the iCART: INFLUENCING SHOPPING BEHAVIOUR IN-SITU
editors of PINC2011 iCART is a persuasive application mounted on a shopping
trolley that attempts to persuade the shopper’s behaviour
and awareness. The system was implemented in C# using
Windows Presentation Foundation for the interface and a Reduction reduces complex behaviour to simple tasks in
Microsoft SQL server. order to increase the benefit/cost ratio and thereby
From our previous research [6], we learned that many influence the user to perform the behaviour [3]. As stated
consumers actually attempt to buy healthy products when above, consumers find it difficult to assess the overall
supermarket shopping, but often they would find it difficult nutrition level for products. The persuasive trolley reduces
to assess the nutrition value or energy level. In fact, several this nutrition value assessment through the simplification in
consumers are actually unsure what a healthy food product the Eat Most classification and thereby the assessment now
is. Shoppers find it difficult to understand the nutrition becomes a simple task. This is illustrated in figure 2 where
information labels on the food products and they usually different products have been classified, e.g. milk as eat less
don’t bother consulting this information. Supermarket (middle picture).
products and groceries are rather diverse, e.g. ranging from
simple non-processed products (e.g. an apple) to more
complex processed products (e.g. a pizza). Usually people
find it difficult to assess how healthy processed products
are. Furthermore, people find it difficult to change behavior
and usually choose well-known products while shopping.
The overall idea of iCART is that all food products and
items in a supermarket can be classified according to
nutrition level and this classification will be presented to
the user of the trolley every time the shopper puts an item Figure 3: Example of reduction in persuasion: Classification
of the cereal product Havrefras as Eat Least
into the trolley. For our persuasive system, we adapt the
nutrition label initiative called Eat Most from the Danish We colour-coded the three categories with green, yellow,
Veterinary and Food Administration. For our purpose, it and red. Figure 3 shows the classification for a cereal
provides a simple classification of food products based on product called Havrefras and this product is an eat least
the nutrition values of a product. The classification label product. The implementation in iCART reduces the action
includes a table for calculating the value of all food of assessing the nutrition value of a product by providing a
products. According to the label, all products can be simple classification of only three categories.
classified as Eat Most, Eat Less, or Eat Least.
The typical use situation could be as follows (illustrated in
figure 1): The user walks around the supermarket with the
trolley, chooses food products and places them in the
trolley (a), the trolley recognizes the product and displays
its classification according to the Eat Most label (b), and
the system updates the status for the entire trolley on
numbers of Eat Most, Less, and Least food products (c).
Figure 4: Examples of suggestion in persuasion: Two
alternative cereal products that are both Eat Most products.
Suggestion means that persuasive technologies have greater
power if they offer suggestions at opportune moments [3].
(a) (b) (c) Consumers find it difficult to choice healthier alternatives
Figure 1: Illustrating the process of using iCART as they often have limited understanding of the relative
Interaction Design levels of nutrition between more products. The persuasive
We adapted three persuasive design tool principles from trolley offers suggestions for alternative products (Eat
Fogg namely reduction and suggestion [1]. The persuasive Most) within the same product group when the shopper
shopping trolley should 1) present or visualize product choices an Eat Less or Eat Least product in the trolley. We
nutrition in a simple way and 2) present alternatives to less consider this an opportune moment as the shopper often
healthy products. Finally, we decided that the system will find the alternatives in their present supermarket area
should be a walk-up-and-use system on a shopping trolley. (as illustrated in figure 4 where two alternative cereals are
suggested for the cereal in figure 3).
FIELD TRIALS
We conducted field trials with the shopping trolley at the
Figure 2: Three classifications of the Eat-Most nutrition label local supermarket called føtex. It was rather important to us
with eat most (left), eat less (middle), and eat least (right). to understand the use of the system in-situ to facilitate the
whole shopping experience.
11 shoppers were recruited through public announcements guided the shopper while shopping. This also had the
and we required that they shopped for food products on a advantage that shoppers always knew where to look for the
regular basis. The shoppers were between 27 and 58 years nutritious information for all products. Today, this
old and represented different kinds of households and information is located on the packaging of the product and
worked in diverse job professions. We asked them to fill in thereby distributed in the store.
a questionnaire on their supermarket shopping experiences The reduction element of iCART was quite successful. Out
prior to the trials. Some of the participants were highly of the 60 food products selected by the participants using
concerned with nutritious food while others were less the system, 30 were classified as Eat Less or Eat Least.
concerned. The participants were divided into two groups - Thus, half of the selected products were less healthy. In
one group used iCART while the other group served as a several cases, the participants were surprised to realize that
control group using a regular shopping trolley. We a certain product was less healthy. For example, one of the
balanced them in the two groups based on their self- participants chose a bag of carrot buns and got surprised to
reported knowledge and attitudes towards nutritious food. see that these buns were Eat Least: “I thought they were
Before the trials, we carried out a pilot test to verify and healthy as they contain carrots”.
adjust the process and our instructions. Participants were
not informed about the purpose of the study in order to On the other hand, several shoppers chose less healthy food
minimize study impact and iCART participants were told products and were aware of it – even without the help from
about the system but not its focus on healthy food products. iCART. But the classification made them reflect upon their
choices and several of them started talking about nutrition
The trials consisted of a three parts namely an introduction, and healthy food. One participant said: “But the Eat-Least
the actual shopping, and a debriefing. We instructed the classification makes you think and questions whether you
participants to shop items from a pre-generated shopping have made the right choice”. From our analysis, it seemed
list using their own normal criteria for food selection. Thus, that they acted out of routine behaviour and that they
they should try to shop as they normally would. The partially knew the consequences of these choices. This
shopping list contained 12 items, e.g. milk, cheese, pate. confirms the findings by Park et al. [8] on changing
The list included only general product groups (except for shopping routine behaviour. In summary, the reduction
one item) leaving the participants to choose within the element of iCART was quite successful as it raised the
group, e.g. cheese where they could choose more 20 awareness of the shoppers on the nutritious level of the
different cheese products. They were free to choose in chosen products.
which order they would collect the items.
The suggestion component of iCART was less successful
303 food items were entered into a SQL database compared to the reduction. The participants changed their
representing all items in the store within the groups from choices 3 times out of 30 (10%). This low number was
the shopping list. Data collection was done through 1) a somewhat surprising, but shoppers gave several reasons for
trolley-mounted video camera that captured verbal this. Some would not change their choice, as they would
comments and shopping behaviour and 2) the system rather buy an unhealthy food product that was biodynamic
logged and time stamped all user interactions enabling to than buy a healthy product that was not. So the shoppers
reproduce action sequences afterwards. The sessions were would implement their own classification schemes based
done during normal trading hours and they were not on other aspects than nutrition. Also, some shoppers stated
required to check out the collected items. that they never bought any light or zero products, which
We evaluated iCART as a Wizard of Oz experiment where often were the products suggested by our system. They said
one of the authors acted as wizard implementing the actions that they would rather eat less of the unhealthy products
taken by the participant. When a food product was put into than buy a light product.
the trolley, the wizard would update this information in the During the field trials, 18 times did the shoppers take a look
system. Another person observed the participant while at the suggestions made by iCART, but in most situations
shopping in order to facilitate the following interview. The (14 times) they chose not to follow the suggestion. This
same procedure was used for the control group, but without indicates that the shoppers are interested in receiving
the trolley-mounted display. The total time spent ranged suggestions but the actual suggestions made by the system
from 12:08 to 40:28 minutes. Finally, a debriefing session in the situation were not good enough. As illustrated above,
including questionnaires and semi-structured interview was they had different objectives when shopping and perhaps
conducted immediately afterwards, e.g. they were asked to suggestion functionality should be carefully organized.
assess their own session and the collected items.
We identified an interesting observation concerning trust to
OBSERVATIONS AND DISCUSSION the system. Some users expressed scepticism towards the
The five participants using iCART expressed that they suggestion part of the system while none of them really
liked the system and they would possibly use it if available questioned the reduction part. Most of them stated that
in supermarkets. While food products in supermarkets nutrition labelling whether on the actual product or
already have different labels for determining the health or implemented in an interactive system on the trolley should
nutritious level, iCART became a personal technology that be controlled and accredited by public authorities. They
were more critical when it concerned suggestions than REFERENCES
reductions. The problem with suggestion could reside in 1. Arroyo, E., Bonanni, L., and Selker, T. (2005)
that it could feel like ads or commercials for other products. Waterbot: exploring feedback and persuasive techniques
That could be a potential problem when implementing at the sink. In Proceedings of the 23rd Annual SIGCHI
suggestion tools. However, as expressed by one of the conference on Human factors in Computing Systems
female participants: “It is cool to be guide. I don’t mind (CHI’05), ACM Press, pp. 631-639
help or receive suggestions, I’m a grown-up who can make 2. Chang, Y-C, Lo, J. L., Huang, C-J, Hsu, N-I, Chu, H-H,
my own decisions”. This could imply that to change Wang, H-Y, Chi, P-Y, Hsieh, Y-L. (2008) Playful
behaviour designers should focus on providing reduction in toothbrush: Ubicomp technology for teaching tooth
complexity of assessing the food product, but they should brushing to kindergarten children. In Proceedings of
perhaps not suggest or give recommendations to the user. 26th Annual SIGCHI conference on Human factors in
Shopping in supermarkets is noisy and complex and it can Computing Systems (CHI’08), ACM Press, pp. 363-372
be stressing due to several multimodal inputs. We noticed 3. Fogg, B. J. (2003) Persuasive Technology – Using
how several participants missed reductions or suggestions Computers to Change What We Think and Do. Morgan
on the screen while acting in the environment. Thus, they Kaufmann
would actually not receive the information proposed by the
system. Also, one participant stated that shopping is private 4. Graham, C., Benda, P., Howard, S., Balmford, J.,
even though it takes place in a public environment. Bishop, N., and Borland, R. (2006) "heh - keeps me off
the smokes...": probing technology support for personal
The participants who shopped without the persuasive change. In Proceedings of the Australia conference on
guidance appeared to have fewer reflections on nutrition Computer-Human Interaction (OzCHI’06), pp. 221-228
and health. In fact, the iCART participants eventually
bought 25 food items classified as Eat Least whereas the 5. Iyengar, S. S., & Lepper, M. (2000) When Choice is
other participants bought 34 Eat Least products. The Demotivating: Can One Desire Too Much of a Good
difference cannot only be explained in terms of the Thing? Journal of Personality and Social Psychology,
suggestion tool implemented in iCART, but the interaction Vol. 79, pp. 995-1006
made them reflect. 6. Kallehave, O., Skov, M. B., and Tiainen, N. (2010)
Reducing the Paradox of Choice: Designing a Nutritious
CONCLUSION
Persuasive Shopping Trolley. In Hasle et al. (eds.)
We presented the persuasive shopping trolley iCART that
Poster Proceedings of the 5th International Conference
guides supermarket shoppers in choosing more healthy
on Persuasive Technology (Persuasive 2010), Oulu
food products by classifying all products in three groups
University Press, p. 25-28
namely Eat More, Eat Less, and Eat Least. Field trials with
11 shoppers showed that iCART proved to provide good 7. Linehan, C., Ryan, J., Doughty, M., Kirman, B., and
input on reduction, e.g. reducing the complex task of Lawson, S. (2010) Designing Mobile Technology to
assessing whether a product is healthy or less healthy. Our Promote Sustainable Food Choices. In Proceedings of
participants noticed when the system classified a product as first International Workshop on Nudge & Influence
Eat Least and usually they would start reflecting upon this. Through Mobile Devices, pp. 15-18
Only a few times did this result in change of behaviour 8. Park, C. W., Iyer, E. S., and Smith, D. C. (1989) The
where the user changed the original choice. But mostly the Effects of Situational Factors on In-Store Grocery
suggestion part of the system was less successful. This was Shopping Behaviour: The Role of Store Environment
mainly due to the fact that several participants had rather and Time Available for Shopping. Journal of Consumer
specific requirements to their products, e.g. they should be Research. Vol. 15, pp. 422- 433
biodynamic or they never bought light-products.
9. Richelsen, B., Astrup, A., Hansen, G. L., Hansen, H. S.,
Based on our findings, we see a number of future research Heitmann, B., Holm, L., Kjær , M., Madsen, S. A.,
avenues. First, rather than optimizing the algorithms behind Michaelsen, K. F., and Olsen, S. F.: The Danish obesity
suggestion tools, we propose that we should design systems epidemic
that enables shoppers to make their own decisions in-situ.
10. Schwartz, B. (2004) The Paradox of Choice – Why
This could require a different approach to reduction. Also,
More is Less. HarperCollins Publishers, New York
we need to understand the long-term effects of such
systems and we plan to conduct more longitudinal studies. 11. Todd, P. M, Rogers, Y., and Payne, S. J. (2010)
Nudging the cart in the supermarket: How much is
ACKNOWLEDGMENTS
enough information for food shoppers? In Proceedings
We would like to thank the shoppers from the field trial as
of first International Workshop on Nudge & Influence
well as reviewer comments on earlier versions of the paper.
Through Mobile Devices, pp. 23-26
Towards a Mobile Application to Create Sedentary
Awareness
Gijs Geleijnse, Aart van Halteren and Jan Diekhoff
Philips Research
Eindhoven, The Netherlands
gijs.geleijnse@philips.com , aart.van.halteren@philips.com
ABSTRACT successful persuasive strategies to establish an increased
Prolonged sitting time is a potential health risk, not only for amount of physical activity.
people with an inactive lifestyle, but also for those who do
meet the recommended amount of physical activity. In this Recent medical literature reports that not only an inactive
paper, we evaluate SitCoach, a mobile application to nudge lifestyle may lead to adverse health effects, but also
people from their seats. The application is targeted to office sedentary behavior itself is harmful. Prolonged sitting time
workers. SitCoach monitors physical activity and sedentary is also dangerous for people who meet the WHO guidelines
behavior to provide timely feedback by means of of 30 minutes of physical activity per day [4,12]. The
suggesting sitting breaks. A pilot experiment with a group reduction of sedentary behavior is hence identified as a
of 8 users learned that the general awareness of the target behavior that contributes to a healthy lifestyle.
importance of sitting breaks is low. Combined with the 6XSSRUW WR FUHDWH DZDUHQHVV RI RQH¶V VHGHQWDU\ EHKDYLRU
belief that the ability to take sitting breaks is highly may be beneficial. However, as Owen et al. state in [12],
dependent on external factors, a strategy of proposing break ³JLYHQ WKH UHFHQW UHFRJQLWLRQ RI WKLV SKHQRPHQRQ RI WRR
reminders may not be the most successful for this target much sitting, there are not yet any recommended clinical
group. Future work should focus on raising awareness of guidelines. Commonsense might suggest that it may be
the problem and providing insights into personal sitting prudent to try to minimize prolonged sitting with 5 minute
behavior. EUHDNVHYHU\KRXU´
Author Keywords In this paper, we describe SitCoach, a mobile application
Sitting time, mobile persuasion, sedentary awareness, that assists the user to create sedentary awareness and to
physical activity. have regular sitting breaks. Such an application can be
combined with additional physical activity promotion
ACM Classification Keywords features. To the best of our knowledge, SitCoach is the first
H5.m. Information interfaces and presentation (e.g., HCI): prototype mobile application aimed to reduce sitting time.
Miscellaneous. Using SitCoach, the goal is to collect insights into
INTRODUCTION SRVVLELOLWLHV WR LQIOXHQFH SHRSOH¶V VLWWLQJ EHKDYLRU XVLQJ D
In the past years, a substantial amount of research has been mobile device.
devoted to physical activity promotion through mobile SitCoach targets office workers, a group which is often also
devices. Using the accelerometer embedded in a mobile assisted by break reminder applications on their PCs. Such
phone or in a dedicated device, the energy expenditure of applications are developed to prevent their users from
the user can be estimated. The user may receive feedback repetitive strain injuries. Although such applications show
on his past physical activity level in minutes or burned to be successful in reducing complaints [7], they may not
calories. always be pleasant to use [10]. Morris et al. [10] introduced
Several strategies have been explored to influence the SuperBreak, which stimulates break compliance for
XVHU¶VEHKDYLRUDQGSURPRWHKLJKHUSK\VLFDODFWLYLW\OHYHOV computer usage. Instead of the usual breaks offered by
Most notably, the usage of virtual rewards [1,2], social software packages such as XWrits and WorkRave,
support [3,9] and goal setting [8] have shown to be SuperBreak offers the possibility to make the break time
more productive. By offering the user the possibility to
interact with the PC through gestures during the break,
break compliance is promoted and the productivity during
the break time is increased. Hence, although SuperBreak
may increase break compliance for computer work, it does
Copyright © 2011 for the individual papers by the papers' authors. not target a reduction in sitting time. Moreover, neither of
Copying permitted only for private and academic purposes. This volume the computer packages support break compliance during
is published and copyrighted by the editors of PINC2011." other sedentary time, e.g. during meetings or while reading.
After describing the SitCoach application in the next
chapter, we present a first pilot user experiment to assess
the usability of the application. Through a locus of control
questionnaire and by means of a semi-structured interview,
we gather additional insights on opportunities and
techniques to promote sitting break compliance.
INTRODUCING SITCOACH
SitCoach is an iPhone application that measures physical
activity by means of the built-in accelerometer. The
application records active time and sitting time at a
granularity of one minute.
To fight sitting time and inspire people to take a break once
in a while, the SitCoach reminds users after a configurable
number of in-active minutes via visual, acoustic and tactile
messages. Users set their goals in terms of maximum
number of consecutive sitting minutes and number of active
minutes per day.
Identifying Sitting Time
Using the built-in accelerometer in the smart phone, the
XVHU¶V DFWLYLW\ LV FODVVLILHG LQ DQ DFWLYH DQG LQDFWLYH VWDWH
Every sHFRQG D PHDVXUHPHQW RI WKH SKRQH¶V [ \ DQG ] Figure 1. SitCoach main screen.
positioning is taken by the accelerometer. These three
values are compared with the previous measurement. When A FIRST USER EVALUATION
the difference for x,y or z exceeds 0.3 the accelerometer To assess the usability and user acceptance of the
recognizes a movement. The 0.3 was determined application, SitCoach has been evaluated with users. This
empirically: it is low enough to pick up the walking evaluation also provides insights into WKH SDUWLFLSDQWV¶
movement of the user without getting a false reading from current sitting behavior and their awareness of the
other possible movements like a small turn with the chair harmfulness of sedentary behavior. The goal of the study is
while sitting. to identify future directions for persuasive applications
targeting sedentary awareness.
To distinguish walking from other smaller movements like
a small turn or just standing up from a chair the movement In the study, the participants are provided with an iPhone
will be monitored over a certain interval of time. An with the SitCoach application and are invited to use the
empirically determined value of 5 seconds proved to be application throughout a day at the office. At the end of the
sufficient. day, a semi-structured interview is conducted, to discuss
experiences. Moreover, the participants are questioned
Creating Sedentary Awareness about current sitting break habits and the awareness of the
To motivate users to become more active, the application importance of such breaks is assessed. Apart from the
stores the number of active minutes per day for each of the interview, two questionnaires were handed to the
users. This provides a social nudge for users to see how participants: one focusing on the utilitarian and hedonic
others are doing and to comply with the social norm. qualities of the application [5,6] and a second one focusing
When it is time to take a break, SitCoach emits a tactile on the locus of control that people perceive with respect to
(vibration) and an acoustic warning. Users can override the possibilities to reduce their sitting time [13].
acoustic warning. A visual indicator at the main screen Participants
shows when a user is moving, giving the user immediate Eight participants (four females) were invited to participate
feedback about their current behavior. Figure 1 provides a in the experiment, during one working day. All participants
screenshot of the main screen of SitCoach. The green circle were knowledge workers with high computer dependability.
indicates that the application has detect that the user is
Procedure and Design
currently moving and hence the number of active minutes is
increasing while in this state. In the state displayed in the The participants were scheduled on a day they described as
figure, the user is nine inactive minutes away from a break a typical office day. Per participant, a day was selected
reminder. However, if the user is active for a period equal without having appointments outside the office during
to the actual time of the sitting break, the break timer will working hours.
be reset.
In the morning after arriving at the office, the participants
received a fully charged iPhone 3G. SitCoach was the only which is installed by default. The others have disabled it.
application installed, apart from the standard software. The For a mobile application to create sedentary awareness, the
participants were instructed not to use the phone for other perceived control over the sitting breaks should remain with
purposes. No SIM card was installed, limiting the the user.
functionalities of the phone.
The interviews showed that the phone vibration to signal
During the intake meeting, the participants were explained break alerts was appreciated as it is discrete and easy to
the functionality of the applications and guided through the ignore when needed, for example during meetings. On the
features and settings. The standard break timer was set to other hand, the buzzing signal was experienced to be
60 minutes, prompting for a 5 minute break. The standard GLVWUDFWLQJ ³:KHQ , DP ZRUNLQJ , GRQ¶W ZDQW WR EH
activity goal was set to 50 minutes. The participants were GLVWXUEHG´
free to change the settings throughout the day.
The Locus of Control questionnaire revealed that six out of
$URXQG R¶FORFN LQ WKH DIWHUQRRQ WKH SDUWLFLSDQWV ZHUH eight participants scored low on the internality dimension
interviewed based on a list of pre-defined questions on their (scores < 18 on a range from 6 to 36), while the other
sitting behavior, sedentary awareness and the SitCoach scored moderate (18 score 24). This implies that the
application. Moreover, the two questionnaires were handed. office workers participating in the study believe that they
have little control over their sitting behavior. With overall
The Attrakdiff2 questionnaire was presented to assess both
higher scores on the powerful others dimension, it is
the pragmatic and hedonic qualities of SitCoach [5,6]. His
believed that others (colleagues, managers) strongly
scores on both qualities are important for the prolonged
GHWHUPLQHWKHSDUWLFLSDQWV¶VLWWLQJEHKDYLRU
usage of a product. Specifically, the questionnaire measures
perceived pragmatic quality, hedonic quality identification The Attrakdiff2 questionnaire results show favorable scores
LH GRHV WKH SURGXFW FRQWULEXWH WR WKH XVHU¶V LGHQWLW\ LQ D on the pragmatic dimension, implying that the participants
social context?), hedonic quality stimulation (i.e., does the are generally positive about the interaction with the
product help to develop skills or knowledge) and SitCoach application. No remarks were made about any
attractiveness (is the product good, bad or ugly?). Each of inaccuracies of the application. This suggests that the
those four categories contains seven word-pairs on a seven current implementation is well usable to distinguish sitting
point semantic-differential scale (e.g. discouraging vs. time from active time. Lower scores were reported on the
motivating, complicated vs. simple). hedonic dimensions, most notably on attractiveness.
7RDVVHVVWKHSHUFHLYHGORFXVRIFRQWUROWRLQIOXHQFHRQH¶V Table 1. 8VHUV¶UHVSRQVHVWRWKHORFXVRIFontrol questionnaire.
sitting behavior, a locus of control questionnaire was
Participant I nternality Powerful Chance
assessed [13]. The commonly used questionnaire,
others externality
developed by Wallton et al., is adapted for sitting behavior.
externality
The questionnaire measures whether the control over the
sitting behavior is determined internally (i.e. self-control; Person 1 Moderate Moderate Low
example statement: If I take care of myself, I can avoid long
Person 2 Moderate High Moderate
sitting periods), by others (e.g. Whenever I feel I sit too
much and too long, I should consult a trained professional.) Person 3 Low High Moderate
or by chance (e.g. No matter what I do, I 'm likely to have
Person 4 Low High Moderate
long sitting periods).
Results Person 5 Low Moderate Moderate
All participants indicated that they were not aware of the Person 6 Low Moderate Low
harmfulness of sedentary behavior itself. When taking a Person 7 Low High Low
break and getting up from their desk, the participants did so
because they were aware of the adverse effects of Person 8 Low High High
prolonged computer usage and the healthfulness of physical Some of the participants reported battery problems with the
activity. Half of the participants reported to be unhappy smart phone. Although the participants received a fully
with the amount of sitting time during a day in the office. charged phone, the battery time was not enough for the
Suitable moments to take a sitting break are in between application to run for the whole working day. Hence, in
tasks and when feeling less concentrated. The time spent future work, solutions should be researched that take the
during such breaks is not seen as productive. energy consumption of the phone into account when
The lack of control is seen as the largest source of running such accelerometer-based applications.
annoyance with PC break applications. Only one of the The functionality to share the activity minutes on FaceBook
participants is using an RSI prevention program on the PC, or other social media was not well received. Similar to the
findings of Munson et al. [11], participants did not feel the Avrahami, D., Froehlich, J.E., LeGrand, L., Libby, R.,
need to bother their social network with such details. Mosher, K., & Landa\-$³)ORZHUVRUD5RERW$UP\"
Encouraging Awareness & Activity with Personal,
Table 2. 8VHUV¶UHVSRQVHVWRWKHAttrakDif2 questionnaire.
0RELOH'LVSOD\V´3URFRI8EL&RPS-63.
Ppn Pragmatic Hedonic Hedonic Attractive 3. Fujiki, Y (2010). iPhone as a Physical
Quality Quality Quality ness Activity Measurement Platform. In Proceedings of the
I dentification Stimulatio 2010 ACM Conference on Human Factors in Computing
n Systems (CHI).
1 High Moderate High Moderate 4. Hamilton, M.T., Healy, G.N., Dunstan, D.W.,
2 High Low Low Low Zderic, T.W., and Owen, N. (2008). Too little exercise
and too much sitting: Inactivity physiology and the need
3 Moderate Moderate Moderate Low for new recommendations on sedentary behavior. Current
4 Low Moderate Moderate Low Cardiovascular Risk Reports 2(4), 292-298.
5. Hassenzahl, M. (2006) Hedonic, emotional and
5 High High Moderate Moderate
experiental perspectives on product quality. In Ghaoui, C.
6 High High High Low (ed) Encyclopedia of Human-Computer Interaction.
Hershey: Idea group, 226-272.
7 High Moderate High Low
6. Hassenzahl, M. (2010) Attrakdiff. Retrieved
8 High Moderate High Moderate August 11th 2010 from
http://www.attrakdiff.de/en/AttrakDiff-/What-is-
AttrakDiff/Scientific-Background.
CONCLUSION AND FUTURE WORK
In this paper, we presented an application to assist people to 7. Heuvel, S.G. van den, Looze, M de, Hildebrandt,
control their sitting behavior. The mobile application V.H., and The, K.H (2003). Effects of software programs
combines feedback on physical activity with insights on the stimulating regular breaks and exercises on work-related
XVHU¶V VLWWLQJ SHULRGV SitCoach was developed to gain neck and upper-limb disorders. Scand J Work Environ
LQVLJKWVLQWRSHRSOH¶Vawareness of their sedentary behavior Health 29(2):106±116.
and the user acceptance of a break reminder application. 8. Lacroix, J., Saini, P., Holmes, R. (2008). The
relationship between goal difficulty and performance in
With SitCoach, we have created an application that detects the context of Physical Activity. IQ0RELOH+&,¶.
sitting time with fair accuracy. However, the users involved
in the trial showed not to be in the right stage of change to 9. Lin, J; Mamykina, L; Lindtner, S; Delajoux, G;
be responsive to the strategies applied in SitCoach. 6WUXE +% ³)LVK¶Q¶6WHSV (QFRXUDJLQJ 3K\VLFDO
Persuasive strategies to stimulate the user to take sitting $FWLYLW\ZLWKDQ,QWHUDFWLYH&RPSXWHU*DPH´8EL&RPS
breaks are likely to be more successful after having 2006.
established awareness of the adverse health effects of sitting 10. Morris, D., Bernheim Brush, A.J. and Meyers, B.R
behavior. This can be done by first providing insights in (2008). SuperBreak: Using Interactivity to Enhance
RQH¶ VLWWLQJ EHKDYLRU DQG VXEVHTXHQWO\ VXJJHVWLQJ Ergonomic Typing Breaks. Presented at CHI 2008.
opportunities to reduce sitting time. For users who are
11. Munson, S., Lauterbach, D., Newman, M.W.,
aware of the problem and the adverse effects of their
Resnick, P. (2010). Happier Together: Integrating a
behavior, the triggers applied in SitCoach may be revisited.
Wellness Application into a Social Networking Site.
ACKNOWLEDGMENTS PERSUASIVE 2010.
This work was funded by the European Commission, within 12. Owen, N., Bauman A., and Brown, W. (2009).
the framework of the ARTEMIS JU SP8 SMARCOS Too much sitting: a novel and important predictor of
project ± 100249 - (http://smarcos-project.eu). chronic disease risk? British Journal of Sports Medicine
42(2).
REFERENCES
1. Consolvo, S., Everitt, K., Smith, I., & Landay, 13. Wallton, K.A, Strudler Wallton, B., DeVellis, R.
-$ ³'HVLJQ 5HTXLUHPHQWV IRU 7HFKQRORJLHV WKDW (1978). Development of the Multidimensional Health
(QFRXUDJH3K\VLFDO$FWLYLW\´ 3URFHHGLQJVRI &+, Locus of Control Scales. Health Educ Behav 6(1):160 ±
457-66. 170.
2. Consolvo, S., Klasnja, P., McDonald, D.W.,
MONARCA: A Persuasive Personal Monitoring System to
Support Management of Bipolar Disorder
Gabriela Marcu Jakob E. Bardram
Human-Computer Interaction Institute IT University of Copenhagen
Carnegie Mellon University Rued Langaards Vej 7, Copenhagen, Denmark
5000 Forbes Ave, Pittsburgh, PA, USA +45 7218 5311
gmarcu@cs.cmu.edu bardram@itu.dk
ABSTRACT multitude of ways. For example, patients and their clinicians
MONARCA is a persuasive mobile phone application de- can use the data to determine the effectiveness of medica-
signed to support the treatment and management of bipolar tions, find illness patterns and identify warning signs, or test
disorder. Behavioral data is monitored through both sensing potentially beneficial behavior changes. Behavioral data
and manual patient input, while timely feedback is provided collected could be used to predict and prevent the relapse of
based on clinical recommendations to help patients adjust critical episodes.
their behavior and manage their illness. This paper presents Despite the plethora of research into personal monitoring
the design process behind the MONARCA system and ini- systems targeting behavior change [8], health-related behav-
tial findings on the challenge of designing a persuasive sys- ior change (e.g., physical activity [5, 1], diet [9], cardiac
tem for the management of bipolar disorder. We discuss rehabilitation [6], and others [3]), and even the management
how difficult the design of such technology has turned out of chronic illnesses (e.g., diabetes [7, 11], chronic kidney
to be, for two primary reasons: (1) the inherent challenges disease [10], asthma [4]), mental illness has remained rela-
of using persuasive metaphors with a complex mental ill- tively unexplored. One explanation for this untapped poten-
ness, and (2) the tradeoffs encountered due to varying, and tial is the complexity and variation of a mental illness like
sometimes conflicting, stakeholder needs. bipolar disorder, which causes uncertainty in how to manage
it. Moreover, there is no simple connection between measur-
Author Keywords able parameters and the course of treatment; mental illness is
Bipolar disorder, mental illness management, user-centered fundamentally complex and is often tied into physical health
design, personal monitoring systems problems as well as social problems. In the MONARCA
project we aim to overcome this challenge by developing a
ACM Classification Keywords system that, through pervasive data collection and feedback
H.5.2 Information Interfaces and Representation: User In- to the patient, supports the treatment of bipolar disorder.
terfaces – User-centered design. J.4 Social and behavioral As such, the MONARCA system can be classified as a per-
systems: Psychology. suasive technology [2], similar to other persuasive health-
related ubiquitous computing systems. The design of such
INTRODUCTION persuasive systems is, however, extremely difficult. It is
Persuasive personal monitoring systems seem promising for very unclear how feedback should be given to the patient in
the management of mental illnesses such as bipolar disorder. order to influence and change behavior. Numerous studies
Bipolar disorder is characterized by recurring episodes of have proven that that trying to change unhealthy behavior
both depression and mania, with treatment aiming to reduce such as smoking, drinking, or lack of exercise is extremely
symptoms and prevent recurrence throughout a patient’s difficult even with the use of intensive counseling. Medicine
lifetime. By applying pervasive healthcare technologies to compliance is also a fundamentally hard problem in
the treatment of bipolar disorder, we can monitor patients’ healthcare. Therefore, it is quite challenging – some would
behavioral and mood data, and provide timely feedback to say naïve – to rely on non-human actors like computers and
them in order to help them adjust their behavior. This data mobile phones to be able to change unhealthy behavior.
supports the treatment and management of the illness in a
In this paper, we describe the user-centered design process
and initial findings on the challenge of designing a persua-
sive system for the management of bipolar disorder. We
discuss how difficult the design of such technology has
turned out to be, for two primary reasons: (1) the challenges
of using persuasive metaphors with a complex mental ill-
ness, and (2) the tradeoffs encountered due to varying, and
sometimes conflicting, stakeholder needs.
METHOD (based on phone calls and text messages). This data is ab-
Patients and clinicians of a bipolar disorder treatment pro- stracted for analysis, to protect the patient’s privacy while
gram took part in an in-depth participatory design process. still supporting self-assessment using objective data.
They were instrumental in decision-making about features
through collaborative design workshops and iterative proto- Historical overview of data
typing. Patients participated in semi-structured interviews The patient and clinician will both have access to the data
about the treatment and management of their own illness to through a web interface. This will give them the means to
further inform the design process. Notes and artifacts from explore the data in depth by going back and forth in time,
these design activities were analyzed for 1) an understand- and focusing on specific sets of variables at a time.
ing of each stakeholder's motivations and needs, and 2)
indicators of tradeoffs that arose in the design of the sys- Coaching & self-treatment
tem. Psychotherapy will be supported through everyday rein-
forcement in two ways. Customizable triggers can be set to
Workshops were held every other week for six months. At
have the system notify both patient and clinician when the
every workshop, 1-3 individuals attended from each of the
data potentially indicates a warning sign or critical state.
following three stakeholder groups: patients, clinicians, and
Second, after patients are advised by their clinicians about
designers. The designers led each three-hour workshop by
which actions to take in response to warning signs, they can
facilitating discussion about particular design goals and
keep track of and review them through the system.
issues; system features and functionality; and feedback on
mockups and prototypes of the system. During initial work-
Data sharing
shops, overall goals of the system were introduced from In order to strengthen the psychotherapy relationship data
both clinical and technical perspectives. Sharing these per- and treatment decisions are shared between the patient and
spectives of the project involved drawing from their respec- his/her clinician. Similarly, sharing data with family mem-
tive best practices: both medically and practically, clini- bers or other caregivers empowers the patient to support the
cians know what works with patients; and designers are treatment process. Finally, sharing data among patients
aware of related systems and technologies. helps with personal coping and management efforts by re-
Design activities at workshops began in the early stages assuring patients that they are not alone, and helping them
with hands-on brainstorming. We provided materials such see how others manage their illness.
as documents summarizing the goals of the system, images
of existing tools and methods, large poster paper, writing CHALLENGES WITH A PERSUASIVE METAPHOR
materials, scissors, tape, etc. The sketches that came out of One of the main original goals of the user-centered design
this initial brainstorming formed the basis for the first process was to design a persuasive system for bipolar pa-
mockups. For the rest of the process, at each workshop we tients, which could help them constantly adjust their behav-
1) discussed a few design goals and system features in ior to manage their own illness. In particular, the design
depth, and 2) received feedback on the next iteration of the process revealed the following three parameters were cru-
mockups. Mockups presented during workshops progressed cial to keeping a bipolar patient stable:
from sketches to wireframes to interactive prototypes. 1. adherence to the prescribed medication – i.e., ensuring
that the patient takes his or her medication on a daily
SYSTEM DESIGN basis
The design process resulted in 5 focus areas for a persua-
sive system for bipolar disorder: self-assessment, activity 2. stable sleep patterns – e.g., sleeping 8 hours every
monitoring, historical data overview, coaching & self- night and going to bed at the same time
treatment, and data sharing.
3. being physically and socially active – e.g., getting out
of the home, meeting with people, going to work.
Self-assessment
Subjective data is collected through a mobile phone using a Now – at first glance, this may seem simple, but numerous
simple one-page self-assessment form. Less than 10 items studies have shown that each of the above three things are
are entered by the patient on a daily basis, including mood, very difficult to achieve for many patients, and achieving
sleep, level of activity, and medication. Some items are all three consistently is inherently challenging in combina-
customizable to accommodate patient differences, while tion with a mental illness. Hence, the core challenge is to
others are consistent to provide aggregate data for statistical create technology that would help – or “persuade” – the
analysis. A simple alarm reminds the patient to fill out the patient to do these three things every day.
form.
Most persuasive health-related Ubicomp systems have
Activity monitoring
adopted different metaphors with the goal of motivating the
Using sensors in the phone, objective data is collected to patient to perform healthy behavior. Examples of such
monitor level of engagement in daily activities (based on metaphors include a garden that grows when the person is
GPS and accelerometer), and amount of social activity physically active; a fish that grows when the person walks
more; and a dog that is happier when the person eats too much time or attention on the clinician's part, the clini-
healthy meals. Common to these metaphors is a simple-to- cians would reject it. An example of one such feature was
understand relationship between behavior (e.g. exercise) the system suggesting that the patient contact the clinic if
and visualizations in the metaphor (e.g. more flowers in the data collected indicated possible warning signs – and mak-
garden). ing it easy for the patient to place this call. The motivation
behind this feature was to encourage the patient to reach out
In the design of the MONARCA project, we tried to adopt for help when needed, but the clinicians ultimately rejected
the same strategy of creating a metaphor. In total of 5 dif- the idea because we could not find a reasonable protocol to
ferent metaphors were tested and tried out in a series of make the benefits to the patient outweigh the burden on the
design workshops. These metaphors included the use of an clinic's resources. Features of the system also couldn't pre-
abstract color picture, a landscape with a river, a dartboard, sent a liability for clinicians, so they were more likely to
a music equalizer, and a scale. The patients and clinicians reject ideas and limit the role of the system to be on the safe
rejected all of these metaphors – one after the other. side. Any kind of text messages or notes written by the pa-
tient and made available to the clinic were kept out of our
Why did this happen? First we thought that maybe we were design, because we could not ensure that the clinicians
just bad at designing the metaphors, and we kept on trying would always read these messages, so we could not make
with new ones. But since it turned out to be a persistent them liable for their content.
“problem”, we think that something more fundamental was
We therefore realized that designing our system with pri-
at stake, which was expressed by one of the patients as:
marily a clinical focus was limiting. The clinicians we
“I do not want my illness to be reduced to a game.” worked with were clearly most comfortable with strategies
that they were familiar with, they had evidence for based on
We think that this is an important insight into the design of their experiences with patients, and were backed by clinical
persuasive technologies for healthcare and self- trials. Deviating from these practices somewhat, and pushing
management. Many of the technologies and metaphors re- our clinicians a little bit out of their comfort zone, enabled
ported so far deal with personal lifestyle related health us to explore other potential strategies, from the perspectives
management, which is fundamentally different from pa- of the patients and the designers.
tients with a diagnosed mental illness. We think that the
design of feedback to the patient needs to follow another An additional example of a debated feature is reported stress
level. A stress level scale was strongly rejected by a clini-
pattern other than using a metaphor.
cian who argued that stress is not a clinically useful meas-
ure, nor is there any clinical definition of stress that would
DESIGN TRADEOFFS
support accurate data collection. Interestingly, a second cli-
During the user-centered design process, we discovered nician was the one who suggested the stress level scale, and
several tradeoffs in the design of the system due to conflict- argued for it from a very patient-centered perspective based
ing stakeholder needs and motivations. These tradeoffs re- in psychotherapy. This clinician found that external stressors
late to the clinical efficacy of the system, the patient’s pri- play a significant part in the mood of her patients, and it was
vacy, sustained use of the system, and other issues. In this useful for her to consider a patient's reported stress level
section, we highlight two of the primary tradeoffs we dealt when assessing how that patient was doing. She also be-
with during the design of MONARCA. lieved that patients would find it useful to assess their own
level of stress, regardless of the fact that they would be in-
Clinically driven vs. patient driven strategies terpreting its meaning for themselves in the absence of a
If a system has a strong clinical focus – meaning that it clinical definition. The patients tended to agree with her, so
adopts only clinically proven treatment strategies – it could although this feature was under debate for several weeks, the
miss out on patient-driven approaches that may be helpful to designers opted to keep it in the design because enough par-
some patients. In addition, the system may also ignore novel ticipants believed there could be personal value in assessing
technological solutions that the clinical field has yet to one's stress.
evaluate. Since our system was designed for a clinical con-
text, it was important that it adhere to clinical practices so The patients were creative in suggesting strategies based on
that it could be evaluated as a valid intervention. In addition, their personal experiences. Knowing what behavioral
considering clinical practices was crucial in designing a sys- changes have worked for them in the past, and imagining
tem to be viable for adoption and acceptance into a patient's what new strategies might work for them, patients explored
treatment, which includes everyday use by the patient and technological solutions unrestrained by considerations of
occasional use by the clinician. clinical efficacy. This unrestrained creativity was productive
during the design process for two reasons. First, it revealed
The clinicians that took part in our design activities shared what would motivate the patients to use the system, which is
with us scenarios, anecdotes, and commonalities about the critical to adoption and acceptance. Second, it helped us
treatment of their patients. We understood the context we realize which measures, though clinically significant, would
were developing the system for by understanding the prac- ultimately fail because they were too intrusive for the patient
tices of clinicians with their patients. A recurring theme was to collect, or were not interesting enough to the patient to
clinicians' limited resources. This turned into a limitation for motivate collection.
the functionality of the system, because if something took
Egocentric patient bias vs. clinician generalizations ACKNOWLEDGMENTS
Although patients provide valuable insights into the experi- This work has been partially funded by the EU Contract
ence of living with and managing bipolar disorder, their in- Number 248545 - MONARCA under the 7th Framework
put tends to be egocentric, since their knowledge about the Programme. We would like to thank our participants for
disorder mostly comes from their own personal experience their contributions to this project and enthusiasm for the
with it. Discussions about the amount and type of data to work.
collect were complex due to the different experiences and
motivations of the stakeholders: clinicians were interested in REFERENCES
data they knew to be relevant for assessment based on clini- 1. Consolvo, S., McDonald, D. W., Toscos, T., Chen, M.
cal studies or their own experiences treating patients; and Y., Froehlich, J., Harrison, B., Klasnja, P., LaMarca,
patients were interested in data they thought would be useful
A., LeGrand, L., Libby, R., Smith, I., Landay, J. A. Ac-
to themselves personally for self-reflection. To balance these
sometimes opposing interests, designers focused on what tivity Sensing in the Wild: A Field Trial of UbiFit Gar-
data would be easy and convenient to collect. Without non- den. Proc. CHI 2008, ACM Press, pp. 1797-1806.
intrusive data collection methods, the system will be over- 2. Fogg, B.J., Persuasive technology: using computers to
loaded with features and burden the patients, who are re- change what we think and do. 2003, Morgan Kauf-
sponsible for collecting the data every day. Here, the design- mann.
ers play an important role in keeping in perspective the im- 3. Korotitsch, W. J., and Nelson-Gray, R. O. An Over-
plications of collecting different amounts and types of data. view of Self-Monitoring Research in Assessment and
Treatment. Psychological Assessment, 1999. 11(4), pp.
Patients and clinicians disagreed about how to include cus- 415-425.
tomizable personal warning signs, which patients would
4. Lee, H. R., Panont, W. R., Plattenburg, B., de la Croix,
personalize and track on a daily basis. In addition to the uni-
J., Patharachalam, D., Abowd, G. Asthmon: Empower-
versal warning signs that we selected with the help of clini-
cians to be applicable to most, if not all, patients, we dis- ing Asthmatic Children’s Self-Management with a Vir-
cussed including personal warning signs that each patient tual Pet. Proc CHI 2010, ACM Press, 2010, pp. 3583-
could customize based on personal symptoms. Clinicians 3588.
argued that there should be as few of these items as possible, 5. Lin, J. J., Mamykina, L., Lindtner, S., Delajoux, G.,
even stating that one personal warning sign was difficult Strub, H. B. Fish‘n’Steps: Encouraging Physical Activ-
enough for patients to attempt to track in their daily life. On ity with an Interactive Computer Game. Proc. Ubicomp
the other hand, patients argued that having more flexibility 2006, LNCS, pp. 261-278.
would allow them to explore multiple warning signs at once 6. Maitland, J., Chalmers, M. Self-monitoring, self-
in order to determine which ones applied to them. One pa- awareness, and self-determination in cardiac rehabilita-
tient, who had difficulty understanding her illness and could tion. Proc. CHI 2010, ACM Press, pp. 1213-1222.
not identify any of her personal warning signs, asked for a 7. Mamykina, L., Mynatt, E., D., and Kaufman, D., R.
lot flexibility because she would have no idea what to track, Investigating Health Management Practices of Indi-
so she would need to try many different items. The designers viduals with Diabetes. Proc. CHI 2006, ACM Press,
found a solution by suggesting that the feature be limited but pp. 927-936.
flexible. The agreed upon solution would allow patients the 8. Oinas-Kukkonen, H. Behavior Change Support Sys-
option to include as few as one personal warning sign, but tems: The Next Frontier for Web Science. Web Science
no more than three. Those patients who would only be able Conf. 2010.
to handle one item at a time could customize the system to
9. Pollak, J. P., Gay, G., Byrne, S., Wagner, E., Retelny,
show only one at a time.
D., Humphreys, L. It’s Time to Eat! Using Mobile
Games to Promote Healthy Eating. Pervasive Comput-
CONCLUSION
ing, IEEE CS, 2010, pp. 21-27.
In the design of a persuasive personal monitoring system
10. Siek, K. A., Connelly, K. H., Rogers, Y., Rohwer, P.,
for bipolar disorder, we ran into several challenges unique
Lambert, D., and Welch, J., L. When do We Eat? An
to using persuasive technology for the management of men-
Evaluation of Food Items Input into an Electronic Food
tal illness. Our findings demonstrate that the design of a
Monitoring Application. Proc. Pervasive Health 2006,
system for bipolar disorder is quite different from that of
IEEE.
systems that have been explored for other health purposes
11. Smith, B. K., Frost, J., Albayrak, M., and Sudhakar, R.
such as nutrition, physical activity, and chronic physical
Integrating glucometers and digital photography as ex-
illnesses. In this paper we have highlighted some of the
perience capture tools to enhance patient understanding
main issues that emerged during our design process, includ-
and communication of diabetes selfmanagement prac-
ing using a persuasive metaphor, balancing clinical- and
tices. PUC, 2007, 11(4), pp. 273-286.
patient-centered strategies, and dealing with the biases of
patient and clinician participants. Our work revealed major
challenges due to the complexity of the illness, stigma sur-
rounding the illness, and the often-conflicting needs of cli-
nicians and patients.
Building Persuasion Profiles in the Wild: Using Mobile
Devices as Identifiers.
Maurits Kaptein
Eindhoven University of Technology / Philips Research
Den Dolech 2, 5600MB, the Netherlands. m.c.kaptein@tue.nl
ABSTRACT make their choice—the current version does not imple-
Tailoring — presenting the right message at the right ment social influence strategies and does not adapt to
time — has long been identified as one of the core op- its users.
portunities of persuasive systems. In this paper we de-
scribe a scenario in which an adaptive persuasive sys- Social Influence Strategies
tem which identifies users by the Bluetooth key of their Cialdini [2] shows how small changes to messages—such
mobile phone is used to promote energy savings. By as the message on the door—can increase their effective-
describing this simplistic system and its possible imple- ness. For example, a message in a hotel room asking
mentation we identify several key-criteria of adaptive guests to “reuse their towels” compared to a message
persuasive systems. stating “Join your fellow citizens in helping to save the
environment” led to a difference in towel re-usage of
Author Keywords
28.4% [7]. To structure thes types of messages Cialdini
[2] identifies six social influence strategies: Authority,
Persuasive Technology, Influence strategies
Consensus, Reciprocity, Liking, Scarcity, and Commit-
ment. The message in the towel re-usage example im-
ACM Classification Keywords plements the Consensus strategy: people act like other
H.1.2 User/Machine Systems: Software psychology. people do. A message (e.g.) stating that “The general
manager of this hotel requests you to re-use...” would
INTRODUCTION
implement the Authority strategy. These social influ-
ences strategies can easily be used to improve upon the
CHI2010 attendees were presented with a choice on
effectiveness of the paper-sign.
entering the conference hotel: A large revolving door
provided access to the hotel while next to it was a slid-
The final promise of persuasive technologies however—
ing door—some things simply do not fit through a re-
adapting influence attempts to individuals—will
volving door. With the air conditioning in full opera-
require some kind of interactive system. While
tion revolving doors are efficient at keeping the heat in.
adaptation of persuasive strategies to responses by
Sliding doors, however, are not. To help save energy a
users is mentioned early on in the literature on
paper-sign was put up: “Please take the revolving door”.
persuasive technologies Fogg [5, e.g.] we are unaware
A brief observation proved the paper-sign to be effec-
of any actual implementations.
tive just over half the time: 60% of the visitors took
the revolving door. This scenario, the “Revolving Door
Individual Differences
Problem”, offers a framework to describe adaptive per-
suasive systems. By further elaborating this scenario There is growing evidence that individuals differ in their
and exploring a solution we describe the neccesities and responses to influence strategies: Constructs like Need
difficulties that arise when designing adaptive persua- For Cognition [1] predict the response of individuals to
sive systems. the usage of social influence strategies. More concretely,
Kaptein et al. [9] show that usage of influence strategies
for individuals who are low susceptible to these strate-
The Promises of Persuasive Technology gies can lead to backfiring: for a portion of participants
There are three reasons why employing a persuasive sys- in their study compliance to a request was lower when
tem might be more effective than the current paper- the social influence strategy was presented. Next to this
sign: (1) Persuasive technologies function as social ac- overall tendency to respond to influence strategies, some
tors and can use social influence strategies, (2) they can individuals seem more likely to respond to one specific
be context aware, and (3) they can adapt to individual strategy—e.g. an authority argument—while others are
users [5, 8]. While the paper-sign is probably located more influenced by implementations of other strategies.
at the right place and at the right time—when visitors Cialdini et al. [3] shows that there are sizable and stable
individual differences in people’s responses to the com-
mitment strategy. Similar results have been obtained
when looking at the consensus strategy: Self-reported
susceptibility to this strategy highly correlates with be- of approaches the visitor has made to the doors and p
havioral responses to this strategy [10]. denotes the probability of success: the probability of
taking the revolving door. Given M messages one can
These individual differences in susceptibility to differ- compute for each individual, for each message, proba-
ent persuasive strategies imply that persuasive systems bility pm = km /nm where km is the number of observed
should personalize the way in which they attempt to successes after representation of message m, nm times
influence individuals. Such a class of systems, which we to a specific visitor. It makes intuitive sense to present
call adaptive persuasive systems, are an unexplored area a visitor with the messages with the highest pm .
in that we still need to understand how to model, design
and build these systems. This paper takes a concrete For a large number of observations N of one visitor this
but simple example that encapsulates the quintessence would make perfect sense. However, this will not inform
of this problem to discuss how to address these chal- a decision for a newly observed visitor. For a new visitor
lenges. one would present the message m for which pm is max-
imized over previously observed visitors1 . Actually—
SOLVING THE REVOLVING DOOR PROBLEM? given Stein’s result [4]—for every user a weighted aver-
Returning to the revolving door problem, let us consider age of the pm for an individual user and those of other
what is involved in implementing an adaptive persuasive users—one where the estimated p�m for an individual is
system. We need to (A) identify the visitors entering the “shrunk” toward the population mean—will provide a
lobby—minimally by giving each a unique ID, and (B) better estimate than an estimate based on observations
measure the effectiveness of a presented message. The of a single visitor alone. E.g., if the authority message is
Bluetooth key of visitor’s mobile phone could be used effective 70% of the time over all visitors and only 30%
for identification [11]. This will capture around 12% of percent of the time for the specific visitor under consid-
the visitors entering the lobby. This same identification eration, the best estimate of the (real) effectiveness of
method can also be used to measure the effectiveness of the authority message p�A for this visitor is a weighted
each persuasive attempt: One Bluetooth scanner next average of these two.
to the revolving door and one next to the sliding door
could determine which entrance was used by the current Adapting to Individuals
visitor. Based on this knowledge about the visitor and To include both the known effectiveness of a message
records of earlier decisions a message implementing the for others, and a specific visitors previous responses to
right influence strategy can be selected. In the remain- that same message, into a new estimate of message ef-
der of this paper, we focus on the mechanism by which fectiveness, pm , we use a Bayesian approach. A com-
these strategies can be selected. mon way of including prior information in a binomial
random process is to use the Beta-Binomial model [12].
Suppose we have only two messages to show, one imple- The Beta Beta(α, β) distribution functions as a con-
menting the authority strategy—“The general manager jugate prior to the binomial. If we re-parametrize the
of this hotel urges you to...” (A)—and one implement- beta distribution as follows
ing the consensus strategy—“80% of our visitors always
use...etc.” (B). The system then needs a mechanism to π(θ|µ, M ) = Beta(µ, M )
choose the message that is most likely to be effective
for the current visitor. It is intuitive that for a new vis- where µ = α+β α
and M = α + β, then the expected
itor the system should present the message which has value of the distribution is given by: E(θ|µ, M ) = µm .
lead to the highest compliance for other, previously ob- In our scenario this represents the expected probability
served, visitors. If this message is successful then there of a successful influence attempt by a specific message.
is no need to try different messages on subsequent visits. The certainty of this estimated success probability is
However, when the selected message is not effective, it represented by:
might become attractive to present another message on
the next visit. This decision logically depends on the µ(1 − µ)
V ar(θ|µ, M ) = σ 2 =
initial succes probabilities of the messages under con- M +1
sideration, the variance of effectiveness of messages be-
tween visitors, and the number of succes’s or failures ob- After specifying the probability of success µm of mes-
served for the current visitor. A collection of estimates sage m and the certainty about this estimate σm 2
we can
of the effectiveness of different influence strategies for treat this as our prior expectancy about the effective-
an individual is called a Persuasion Profile and can be ness of a specific message and update this expectancy
used to select the most-likely-to-be effective message on by multiplying it by the likelihood of the observation(s)
a next visit. to obtain the distribution of our posterior expectation:
p(θ|k) ∝ l(k|θ)π(θ|µ, M )
Formalizing the Adaptation Problem = Beta(k + M µ, n − k + M (1 − µ))
The probability of a single visitor taking the revolving
door on multiple occasions can be regarded a binomial 1
This is assuming the error costs—the effects of presenting
random variable B(n, p) where n denotes the number the wrong message—are equal for each message.
The newly obtained Beta distribution, B(µ, M ), func- A and 50% to strategy B, (2) susceptible visitors,
tions as our probability distribution with a new point- A = 40%, B = 90%, (3) visitors susceptible to message
estimate of the effectiveness of the presented message B, A = 10%, B = 90%, and (4) visitors susceptible
given by: to message A, A = 90%, B = 10%. Table 1 shows
k + Mµ an excerpt of the simulated data. Based on these
E(θ|k) = simulated data we first compute our population
n+M estimates of message effectiveness for each message:
Decision Rule p�A = 0.38, p�B = 0.58. Thus, message B—the
The Beta-Binomial model described above allows us to consensus message—was most effective.
estimate the effectiveness of message m, include prior
knowledge, and update these estimates based on new Type User Occasion Mes. A Mes. B
observations. A individual’s persuasion profile would 1 1 1 1 0 0
be a record of both the expected success, µm , and the 2 1 1 2 0 0
certainty, σm
2
of different influence strategies. 3 1 1 3 0 1
.. .. .. .. .. ..
To determine which message to present next, one could .. .. .. .. .. ..
pick the message which has the highest µm . However, if 1000 4 20 50 1 0
σm2
is large this decision might not be feasible given that
Table 1. Overview of the simulated data for the 4 differ-
the difference between effectiveness estimates might not ent user groups. Columns Mes. A and Mes. B represent
be significant. To address this we can choose to show the success of the influence message at that point in time.
the message with the highest estimate when this es-
timate is “certain enough”—in the binomial case only Next, we simulate for each visitor, each occurrence at
once sufficient observations are obtained. In uncertain the doors. We select the message as specified by our
situations we can randomly present one of the H mes- decision rule and record the (simulated) outcome. Next,
sages which have the highest estimates out of the total we update our expectancy for the selected message and
set of estimates of M messages. This decision rule would iterate through all occurrences. To ensure a flexible
avoid presenting each new visitor with only the single starting point for each user we set the prior variance of
most effective message when responses to messages are each estimate at the first encounter to be high: σA 2
=
variant. σB = 0.05.
2 3
Because the Beta distribution is not necessarily sym- Figure 1 shows for four users—one out of each group—
metrical the variance σm
2
provides and inadequate start- in separate panels, the estimated probability of success
ing point to compute confidence intervals. This prob- of the two messages (left and right side of each panel).
lem can be solved using simulations: By generating a In the upper left panel—representing a general insus-
number of draws from the specified Beta distribution ceptible visitor —convergence to message B, whose esti-
and computing (e.g.) the 20th and 80th percentiles one mated effect is presented on the right side of the upper
can compute a empirical confidence interval. The above left panel, is slow: it takes about 40 observations before
described decision rule for M = 2 would then result in: B is consistently estimated to be the “best” message.
1 µ1 > P erc(80)2 With higher compliance and/or larger differences in ef-
Mselected = 2 µ2 > P erc(80)1 fectiveness of the two strategies convergence is much
faster. The bottom right of figure 1 shows a user from
Rand(1, 2) otherwise the visitors susceptible to message A group. For this
Thus, if the estimated effectiveness of a message 1, user after 10 observations strategy A is correctly iden-
p�1 = µ1 , is higher than the 80th percentile of message tified as the most successful strategy.
2, P erc(80)2 , the system presents message one.2 If the
confidence interval of two messages overlap the system Limitations of the proposed solution
could randomly present one of these two. There are a number of drawbacks of the proposed
Beta-Binomial solution to create adaptive persuasive
Simulations systems. Besides the fact that when the number of
To explore the presented Beta-Binomial approach in strategies grows the number of necessary occasions
the M = 2 scenario we simulated a dataset presenting for convergence will increase, there are three more
different visitors observed at multiple points in time. fundamental issues which are not addressed by this
The simulated data describes the message success algorithm. First, while including prior information
of two different messages for four different groups based on other users, the algorithm described here
of visitors with 20 visitors each on 50 approaches does not use a shrunken estimate on each occasion:
to the doors. The four groups represent (1) general After including the initial knowledge of the behavior
insusceptible visitors—those that respond favorable to of other visitors the model is specific for an individual
only 10% of the message which implement strategy 3
One could estimate this variance based on the between-
2
The 80th percentile is an arbitrary choice. visitor variance.
0 1020304050 0 1020304050 Mobile devices—as used in our scenario—provide a core
opportunity to serve as an identifier for adaptive persua-
lower + mean + upper
lower + mean + upper
0.8 0.8 sive technologies. Currently we are operating a system,
0.6 0.6 like the one described here, in real-life and we would
0.4 0.4 like to share our experiences building and deploying this
system during the CHI 2011 PINC workshop.
0.2 0.2
0 1020304050 0 1020304050
References
Occasions Occasions
[1] Cacioppo, J. T. and Petty, R. E. (1982). The need
for cognition. J. of Pers. and Soc. Psy.
0 1020304050 0 1020304050 [2] Cialdini, R. (2001). Influence, Science and Practice.
Allyn & Bacon, Boston.
lower + mean + upper
lower + mean + upper
0.8 0.8
[3] Cialdini, R. B., Trost, M. R., and Newsom, J. T.
0.6 0.6 (1995). Preference for consistency: The development
0.4 0.4 of a valid measure and the discovery of surprising
0.2 0.2
behavioral implications. J. of Pers. and Soc. Psy.,
69:318–328.
0 1020304050 0 1020304050
[4] Efron, B. and Morris, C. (1975). Data analysis us-
Occasions Occasions ing Stein’s estimator and its generalizations. Journal
of the American Statistical Association, 70(350):311–
Figure 1. Progression of point estimates of the effects of 319.
two messages on four different users (the four panels).
Within each panel the left side shows the estimated ef- [5] Fogg, B. J. (2002). Persuasive Technology: Using
fect of message A, including in gray its 80% confidence
interval, and the right shows the estimates for message
Computers to Change What We Think and Do. Mor-
B. A horizontal section in the estimates of message A gan Kaufmann.
indicates that at that point in time the message B was
shown and updated. [6] Gelman, A. and Hill, J. (2007). Data Analysis Using
Regression and Multilevel/Hierarchical Models. Cam-
bridge University Press.
visitor. While this provides quick adaptation there
is no opportunity to adapt estimates based on [7] Goldstein, N. J., Cialdini, R. B., and Griskevicius,
changing population wise trends. Second, since V. (2008). A room with a viewpoint: Using social
the estimates for the effectiveness of the strategies norms to motivate environmental conservation in ho-
are treated independently there is no way to of tels. J. of Cons. Res., 35(3):472–482.
“borrowing strength” [6] based on correlations with [8] Kaptein, M., Aarts, E. H. L., Ruyter, B. E. R., and
other strategies. Both of these concerns could be Markopoulos, P. (2009a). Persuasion in ambient in-
addressed using a multilevel approach. Finally, the telligence. Journal of Ambient Intelligence and Hu-
proposed model provides no method of including prior manized Computing, 1:43—56.
believes about the distribution of visitor profiles over a
population. [9] Kaptein, M., Lacroix, J., and Saini, P. (2010). Indi-
vidual differences in persuadability in the health pro-
CONCLUSIONS motion domain. In Ploug, T., Hasle, P., and Oinas-
We identified two core necessities of adaptive persua- Kukkonen, H., editors, Persuasive Technology, pages
sive systems: a means to identify users and a means to 94—105. Springer Berlin / Heidelberg.
measure effectiveness of persuasive attempts. Further- [10] Kaptein, M. C., de Ruyter, B., Markopoulos, P.,
more, we highlighted a number of challenges associated and Aarts, E. (2009b). Persuading you: Individual
with the design of these systems. The presented Beta- differences in susceptibility to persuasion. In 12th
Binomial solution is lightweight and functions well in IFIP TC 13 International Conference - INTERACT,
simulations with only two messages. More elaborate pages 24–28, Uppsala, Sweden. ACM Press.
algorithms which are (1) variant to changing popula-
tion trends,(2) allow for relationships between strate- [11] Kostakos, V. (2008). Using bluetooth to capture
gies, and (3) enable us to include prior beliefs about passenger trips on public transport buses. CoRR,
user profiles should be explored. Given the current state abs/0806.0874.
of social science literature on influence strategies we be-
lieve that persuasive technologies should tailor the influ- [12] Wilcox, R. R. (1981). A review of the beta-binomial
ence strategies they use to their users. We described one model and its extensions. J. of Educ. Stat., 6:3–32.
possible—but limited—implementation of such a sys-
tem. This, and other, implementations should now be
tested empirically.
Nudging Users Towards Privacy on Mobile Devices
Rebecca Balebako, Pedro G. Leon, Hazim Almuhimedi, Patrick Gage Kelley, Jonathan
Mugan, Alessandro Acquisti, Lorrie Faith Cranor and Norman Sadeh
Carnegie Mellon University
5000 Forbes Ave.
Pittsburgh, PA 15213 USA
ABSTRACT or monitored; other times, while aware of ongoing infor-
By allowing individuals to be permanently connected to the mation flows, we do not understand their consequences, or
Internet, mobile devices ease the way information can be ac- properly assess their risks. Such challenges are magnified
cessed and shared online, but also raise novel privacy chal- in mobile scenarios. Therefore, a mobile device user may
lenges for end users. Recent behavioral research on “soft” end up sharing information in a manner that goes against her
or “asymmetric” paternalism has begun exploring ways of own long-term self interests.
helping people make better decisions in different aspects of
their lives. We apply that research to privacy decision mak- In recent years, there has been growing interest in using
ing, investigating how soft paternalistic solutions (also known lessons from behavioral economics to influence and ame-
as nudges) may be used to counter cognitive biases and ame- liorate decision making in situations where cognitive and
liorate privacy-sensitive behavior. We present the theoret- behavioral biases may adversely affect the individual [11,
ical background of our research, and highlight current in- 16]. This approach is often referred to as soft or asymmetric
dustry solutions and research endeavors that could be classi- paternalism, or with the more popular term “nudges.” Soft
fied as nudging interventions. We then describe our ongoing paternalism aims at countering and overcoming those biases,
work on embedding soft paternalistic mechanisms in loca- so as to assist individual decision making. Our research aims
tion sharing technologies and Twitter privacy agents. at applying and extending lessons from the nascent field of
soft paternalism to the field of privacy decision making. This
Author Keywords paper presents an overview of our research agenda in this
Nudge, Privacy, Security, Location Sharing, Mobile Devices, area. First, we introduce the research exploring cognitive
Soft Paternalism and behavioral biases in privacy decision making. Then, we
examine current academic studies and industry products that
ACM Classification Keywords
focus on influencing privacy (and security) decision making,
and that therefore may be compared to nudging interven-
H.1.2 User/machine systems: Human information process-
tions. Finally, we discuss how we are integrating soft pater-
ing; J.4 Social and behavioral sciences: psychology
nalistic mechanisms in our research on privacy in location
sharing applications and social networks.
INTRODUCTION
As mobile devices and applications become pervasive, pri-
vacy risks to their users also grow. The accessibility and FROM HURDLES IN PRIVACY DECISION MAKING
ease of use of these devices make it easy to casually broad- TO SOFT PATERNALISM
cast personal information at any time, from anywhere, to Findings from behavioral economics and behavioral deci-
friends and strangers. Without a doubt, users benefit from sion research have highlighted hurdles in human decision
and enjoy such streams of information sharing. However, making that lead, sometimes, to undesirable outcomes. The
they also expose themselves to tangible and intangible risks: hurdles are often due to lack of information or insight, cog-
from tracking by commercial entities interested in exploit- nitive limitations and biases, or lack of self-control [16]. Be-
ing personal information for profit, to surveillance or even cause of those hurdles, individuals may end up making de-
stalking by malicious parties. However, it is difficult for in- cisions that they later regret. Those decisions may include
dividuals to determine the optimal balance between reveal- (not) saving for retirement, (not) eating well, or smoking
ing and hiding personal data. Sometimes we are not even cigarettes [11]. They may also include decisions about pro-
aware that information about us is being broadcast, shared, tecting too much, or not enough, personal information [3].
Privacy decisions are complex and often taken in conditions
of information asymmetry (that is, individuals may not have
full knowledge of how much of their personal information is
being gathered, and how it is being used). Furthermore, pri-
vacy decision making may be overwhelming: the cognitive
costs associated with considering all the ramifications of a
Copyright ! c 2011 for the individual papers by the papers’ authors. disclosure may hamper decision making [3]. Finally, cog-
Copying permitted only for private and academic purposes. This volume is
published and copyrighted by the editors of PINC2011. nitive biases may affect one’s propensity to reveal personal
1
information: for instance, heightened control of one’s per- users are interested in protecting their privacy and may even
sonal information may, paradoxically, make the user over- pay for it, if appropriate tools and salient, simple, and com-
confident about sharing information [5]. pact privacy information are offered. Specifically, one series
of studies explored the impact of making information about
Paternalistic policies try to solve decision-making hurdles privacy practices on web sites more accessible to buyers.
by mandating decisions for individuals. Such policies are of- The results showed that online customers are more likely to
ten heavy-handed and generate externalities [11]. Soft pater- shop online from websites that exhibit more protective pri-
nalism, on the other hand, avoids coercion; it seeks to steer vacy policies. Additionally, those customers are willing to
users in a direction (believed to be more desirable based on pay a premium for privacy. Furthermore, privacy indicators
the user’s own prior judgement, or on external empirical val- displayed at the moment an individual is shopping online
idation), without impinging on her autonomy. A soft pater- may have an impact on consumer decisions. In particular,
nalistic solution, for instance, would consist of making an they increase the willingness to pay for privacy; however,
individual aware of the biases, lack of information, or cog- if the indicator is provided only after the shopper has al-
nitive overload that may affect her decision. ready chosen the website from which to buy, the user will
not change their already-made decisions. The authors find
Nudges are tools of soft-paternalism, and may be used to that timing is essential when trying to help people to protect
ameliorate privacy (as well as security) decision making [2]. their privacy [17], [6]. Similarly, another study found that
Their application to scenarios involving mobile devices is merely priming Facebook users with questions about their
particularly appealing. In the case of insecure communica- online disclosure behavior and the visibility of their Face-
tion channels, or covert data collection through a mobile de- book profiles was sufficient to trigger changes in their dis-
vice, a nudge may take the form of an alert that informs the closure behavior [13]. Application interface design is also
user of the risk. In the case of mobile devices that store sen- important, and should help users notice when changes in
sitive information (which could be accessed by strangers if context generate changes in information flows and then help
the phone was misplaced), a nudge might discourage users them to maintain their privacy [7].
from storing private data on mobile phones. When informa-
tion is being disclosed through a smart-phone, nudges may In the context of location sharing applications, providing
provide alerts about the recipients, contexts, or type of data feedback to users whose location has been requested by oth-
being shared. ers has been shown to have both positive and negative im-
plications [8]. It can prevent excessive requests and hence
Many different types of nudging interventions are possible. protect people’s privacy. However, unless appropriate notifi-
Some simply consist of informing the user — in which case cations are used, feedback receivers could also be annoyed.
they relate to privacy research on informed consent. Some In addition, notifications may inhibit users from requesting
focus on making systems simpler to use — in which case, others locations and hence affect system usage.
privacy nudges fall into the realm of research on privacy
usability. However, other nudges aim at countering spe- PRIVACY NUDGES IN INDUSTRY
cific cognitive and behavioral biases, such as neutralizing Examples of industry products or solutions that influence de-
the detrimental effects of immediate gratification biases in cision making in regards to privacy (either to better protect
privacy decision making [1] by altering the individual’s per- the user, or instead to influence her to reveal more informa-
ception of the sequence of costs and benefits associated with tion) take various forms, and some have been applied to mo-
revealing sensitive information. bile devices. Some of these solutions may be interpreted as
soft paternalistic for privacy protection, in the sense that they
The literature on soft paternalism applied to privacy deci-
nudge towards privacy. They include privacy/security us-
sion making is in its infancy, and therefore extremely scarce.
ability solutions, simplifications of privacy settings, or tests
However, a number of recent studies and products focus on
and delays before one can post information. More frequent,
mechanisms that may be categorized as nudges. We present
however, are the examples of products and solutions that
a brief overview of them in the following sections.
nudge individuals to give up even more of their privacy, sur-
rendering sensitive information. These include privacy de-
PRIVACY NUDGES IN THE LITERATURE faults that are open, lack of usability in privacy settings in-
Previous research on the drivers of privacy concerns has demon- terfaces, poorly designed warnings, and other rewards for
strated that users’ attitudes towards security and privacy are sharing data or encouraging friends to share data.
influenced by numerous factors, including information avail-
able, personal beliefs, economic valuations, moral reason- Connections in social applications
ing, social values, cognitive biases, and so on. Therefore, Some applications provide information about who can see
providing adequate information, making privacy tools more your data, who has seen your data, or how many people can
evident, or rewarding and punishing users as they make safer see your data. For instance, Flickr.com, a video and image
or riskier decisions are all ways of nudging or influencing sharing website, provides information on each user-owned
privacy behavior. The privacy literature offers some exam- picture stating who can see it, followed by a link to edit the
ples of these approaches. privacy settings for that picture. This may be a nudge to-
wards privacy, as users may decide to share certain photos
For example, recent experimental research has shown that with friends, and share other photos with everyone.
2
Social networking sites often show the number of connec- doing so. Sophisticated users may choose to employ soft-
tions a user has. These connections may be called follow- ware tools to prevent excess disclosure. For example, the So-
ers, friends, or ties. In some cases, connections can have cial Media Sobriety Test, socialmediasobrietytest.
access to all the user’s information that is on the applica- com, and Mail Goggles on Gmail googlelabs.com both
tion. Twitter and Google Buzz are examples of sites that allow the user to set certain hours of the week when they may
prominently show the number of connections. In the case of typically embarrass themselves, such as weekend evenings
LinkedIn.com, a job searching social network, the user may after trips to the bar. During these hours, social network
prefer to add additional connections, even with people they sites or Gmail may be blocked until the user can complete a
don’t know well, in order to grow their job-searching net- dexterity or cognitive test. The user has the option to bypass
work. However, by opening their information to more con- the test. Alternatively, a user may set up a warning system
nections, they may be compromising their privacy. These ap- if a message is likely to be poorly interpreted. ToneCheck
plications may nudge users towards increasing their connec- tonecheck.com scans emails written in Outlook to dis-
tions and revealing more information. Indeed, several online cover whether the tone is off-putting, and will ask the user to
social networks such as Facebook.com and LinkedIn.com confirm before sending it. This may help discourage users
periodically encourage users to add new connections by search- from sending or posting regrettable information.
ing the user’s email accounts for email contacts.
Other tools may discourage users from posting information
Connections such as friends in Facebook and followers in by reminding the user who can see it. NetNanny is a tool
Twitter do not set the boundaries for information flow. One’s that parents can user to protect their children online. It will
connections may be able to share information with other un- show a message every time a child posts on a social network.
intended recipients, or even make it available to the pub- This message reminds the child that her parents will see the
lic. In Twitter, for example, re-tweets allow connections to post as well netnanny.com.
pass on information without the original sender’s control. In
Facebook, default privacy settings usually allow sharing of
individual’s information with friends of friends. Therefore, ONGOING WORK WITH MOBILE APPLICATIONS
the information provided about the number of connections By studying and understanding the specific biases and user
may mislead the user about the privacy of their data and de- actions in regards to mobile applications, we hope to sug-
crease the likelihood that the user will take an information- gest and test nudges that will help users make decisions that
protective stance. improve their satisfaction and well being. We are moving
towards that goal by first understanding users’ needs, prefer-
Privacy Settings ences, biases, and limitations about privacy, and second by
The privacy settings allowed in an application impact the using that information to evaluate the efficacy of techniques
user’s ability to control how their information is shared. Both that exploit biases to improve decision making. As an exam-
the default settings and the usability of the settings user in- ple, we are currently pursuing foundational studies with two
terface create nudges towards and away from privacy [10, applications developed at Carnegie Mellon: a location shar-
12, 13]. ing application called Locaccino [15] and a privacy agent for
Twitter.
Some websites make privacy options very simple. For exam-
ple, Pandora.com, an online music station, explicitly gives Locaccino is a unique location sharing application that al-
users two options regarding their profile page: make pri- lows users to control the conditions under which they make
vate or keep public. These clear options allow a user to their location visible to others. This includes controlling the
choose without understanding complex details or settings. times and days of the week when different groups of people
Conversely, the lack of granularity may encourage users to can see the user’s location as well as the specific locations
make everything public. where the user is willing to be visible. For instance, a user
can specify rules such as “I’m willing to let my colleagues
Several tools provide simple ratings of privacy settings. Pri- see my location but only when I am on company premises
vacyCheck,1 and ProfileWatch,2 give Facebook settings a and only 9am-5pm on weekdays.” Research conducted by
privacy score. Other services provide a user-friendly layer our group has shown that this level of expressiveness is crit-
on the Facebook privacy settings, allowing the user to change ical to capturing the location sharing preferences many peo-
the settings. For example, Privacy Defender3 provides a slid- ple have when it comes to disclosing their locations to oth-
ing color scale that allows the user to set their Facebook op- ers across a broad range of scenarios [4]—in contrast to the
tions as more or less private. These software services ac- much narrower set of scenarios supported by location shar-
tively encourage stricter privacy settings. ing applications such as Foursquare.
As part of our ongoing research, we are interested in bet-
Reduction of Information Disclosure ter understanding how different elements of Locaccino func-
If an individual expects she may be likely to post information tionality effectively nudge people in different directions. This
she may later regret, software exists to discourage her from includes experimenting with new interface designs as well
1
http://rabidgremlin.com/fbprivacy as new ways of leveraging some of the machine learning
2
http://atherionsecurity.com/idpro.html techniques we have been developing, from exposing differ-
3
http://privacydefender.net ent sets of default privacy personas to users [14] to helping
3
them refine their privacy preferences [9]. We are looking at 6. S. Egelman, J. Tsai, L. F. Cranor, and A. Acquisti.
the preferences of like-minded users who have been using Timing is everything?: the effects of timing and
the system for a while and trying to use their preferences to placement of online privacy indicators. In Proceedings
guide new users. This would have the potential of reducing of the 27th international conference on Human factors
regret by giving new users the benefit of the experience ac- in computing systems, CHI ’09, pages 319–328, New
quired over time by others. We plan to explore to what extent York, NY, USA, 2009. ACM.
such an approach can be made to work and to what extent it
seems beneficial. 7. G. Hull, H. R. Lipford, and C. Latulipe. Contextual
gaps: Privacy issues on facebook. Ethics and
The Twitter privacy agent is an application we are building Information Technology, pages 1–14, 2010.
to help Twitter users behave in a more privacy protective 8. L. Jedrzejczyk, B. A. Price, A. K. Bandara, and
way. We plan to build tools that will provide nudges that B. Nuseibeh. On the impact of real-time feedback on
guide users to restrict their tweets to smaller groups of fol- users’ behaviour in mobile location-sharing
lowers or discourage them from sending tweets from mobile applications. In Proceedings of the Sixth Symposium on
devices that they may later regret. We plan to empirically Usable Privacy and Security, SOUPS ’10, pages
test the impact of these nudges on user behavior. We will 14:1–12, New York, NY, USA, 2010. ACM.
also examine whether fine-grained privacy controls result in
more or less data sharing. 9. P. Kelley, P. Hankes Drielsma, N. Sadeh, and L. Cranor.
User-controllable learning of security and privacy
We expect our work on nudges in behavioral advertising, so- policies. In Proceedings of the 1st ACM workshop on
cial networks, and location sharing to be effective for im- Workshop on AISec, pages 11–18. ACM, 2008.
proving privacy decisions on mobile devices. We further 10. Y.-L. Lai and K. L. Hui. Internet opt-in and opt-out:
hope our soft-paternalistic approach to have a broader im- investigating the roles of frames, defaults and privacy
pact, guiding the development of tools and methods that as- concerns. In Proceedings of the 2006 ACM SIGMIS
sist users in privacy and security decision making. CPR conference on computer personnel research,
pages 253–263, 2006.
ACKNOWLEDGMENTS
This material is based upon work supported by the National 11. G. F. Loewenstein and E. C. Haisley. The Foundations
Science Foundation under Grant CNS-1012763 (Nudging of Positive and Normative Economics, chapter 9: The
Users Towards Privacy), and by Google under a Focused Re- Economist as Therapist: Methodological Ramifications
search Award on Privacy Nudges. This work has also been of ‘Light’ Paternalism. Oxford University Press, 2008.
supported by NSF grants CNS-0627513, CNS-0905562, and 12. W. Mackay. Triggers and barriers to customizing
by CyLab at Carnegie Mellon under grants DAAD19-02-1- software. In Proceedings of the SIGCHI conference on
0389 and W911NF-09-1-0273 from the Army Research Of- Human factors in computing systems: Reaching
fice. Additional support has been provided by the IWT SBO through technology, pages 153–160. ACM, 1991.
project on Security and Privacy in Online Social Networks
(SPION), Nokia, France Telecom, and the CMU/Portugal 13. Ralph Gross and Alessandro Acquisti. Information
Information and Communication Technologies Institute. Revelation and Privacy in Online Social Networks. In
Workshop on Privacy in the Electronic Society (WPES),
REFERENCES pages 71–80, 2005.
1. A. Acquisti. Privacy in electronic commerce and the
14. R. Ravichandran, M. Benisch, P. Kelley, and N. Sadeh.
economics of immediate gratification. In Proceedings
Capturing social networking privacy preferences: can
of the ACM Conference on Electronic Commerce (EC
default policies help alleviate tradeoffs between
’04), pages 21–29, 2004.
expressiveness and user burden? In Proceedings of the
2. A. Acquisti. Nudging privacy: The behavioral 5th Symposium on Usable Privacy and Security,
economics of personal information. Security & Privacy, page 1. ACM, 2009.
IEEE, 7(6):82–85, 2009. 15. N. Sadeh, J. Hong, L. Cranor, I. Fette, P. Kelley,
3. A. Acquisti and J. Grossklags. Privacy and rationality M. Prabaker, and J. Rao. Understanding and capturing
in individual decision making. Security & Privacy, peoples privacy policies in a mobile social networking
IEEE, 3(1):26–33, 2005. application. Personal and Ubiquitous Computing,
13(6):401–412, 2009.
4. M. Benisch, P. Kelley, N. Sadeh, and L. Cranor.
Capturing Location-Privacy Preferences: Quantifying 16. R. Thaler and C. Sunstein. Nudge: Improving decisions
Accuracy and User-Burden Tradeoffs. Journal of about health, wealth, and happiness. Yale Univ Pr,
Personal and Ubiquitous Computing, 2011. 2008.
5. L. Brandimarte, A. Acquisti, and G. Loewenstein. 17. J. Y. Tsai, S. Egelman, L. Cranor, and A. Acquisti. The
Misplaced Confidences: Privacy and the Control effect of online privacy information on purchasing
Paradox. Technical report, Mimeo, Carnegie Mellon behavior: An experimental study. Information Systems
University, 2010. Research, In press, 2010.
4
!"#$%&'()*+%'#%,-./0+%)1%'(0%20+)31%#4%5#6).0%789:
!"#$%&'"()*
!"#$%&'(&)'*#+$",&-./"0."
1,/00"22&)'22"3"
1,/00"224&56&7899:4&;-6
<=>/?@=0A.?%3,/00"22%"<+
;<=>?;:> "[#",/"0."?4 & =0< & ?'./=2 & .+"? & $' & /0(2+"0." & F"E=>/',? & =0<&
B=2+"&-"0?/$/>"&!"?/30&CB-!D&/?&=,'*/?/03&*"$E'<&(',& =$$/$+<"?&X98Z%&\E","&/?&=$$"0$/'0&$'&*'F/2"&<">/."?&G/$E/0&
=<<,"??/03&"$E/.=2&/??+"?&=0<&'##',$+0/$/"?&/0&$E"&<"?/30&'(& $E" & #",?+=?/>" & $".E0'2'3K & .'**+0/$KP & 50 & = & .'22".$/'0 & '(&
*'F/2" & $".E0'2'3/"? & $' & #,'*'$" & F"E=>/', & .E=03"% & 6($",& $G"0$K&"??=K?&'0&*'F/2"",?+=?/'04&M'33&G,/$"?&=F'+$&$E"&
#'?/$/'0/03 &$E" &G',H & G/$E& ,"?#".$ & $'& $E" & I5J) & ?$,=$"3/"?& +0/]+"&?+/$=F/2/$K&'(&*'F/2"&<">/."?&(',",?+=?/'0P&$E"K&=,"&
CI",?+=?/'04&50(2+"0."4&J+<3"4&=0<&)'",./'0D4&5&/0$,'<+."& /0$/*=$"&CVG"&*=,,K&$E"*WD^&$E"K&=,"&'*0/#,"?"0$^&=0<&$E"K&
$E"&B-!&*"$E'<&=0<&=0=2KL"&$E"&,'2"&'(&>=2+"?&/0E","0$&$'& E=>" & ,"*=,H=F2" & .=#=F/2/$/"? & X_Z% & N$E/.? & E=>" & F""0 & =&
I5J)&?$,=$"3/"?&=?&G"22&=?&>=2+"?&/*#2/.=$"<&FK&$E"&*"=0?& ,".+,,/03&.'0.",0&C"%3%4&X`4a49749Y4:8ZD%
=0< & "0 & '( & F"E=>/', & .E=03"% & M/0=22K4 & 5 & .'0?/<", & >=2+"&
$"0?/'0?&=0<&((","0."?&/0&/0>/<+=2&>=2+"?% \E" & I5J) & (,=*/03 & ?+33"?$? & 0"G & =##,'=.E"? & $' & F"E=>/',&
.E=03"% & )/=20/b? & $E"',K & '( &()*#$%)+%& 3/>"? & ?/[ & ?#"./(/.&
;/'(#"%@0AB#"C+ ?$,=$"3/"?&$E=$&=,"&+?"<&FK"'#2"&$'&/0(2+"0."&"=.E&'$E",^&
N$E/.?4&>=2+"?4&B=2+"&-"0?/$/>"&!"?/304 &I5J)4",?+=?/>"& ?'*"&G',H &/0",?+=?/>" &$".E0'2'3K&E=? &<,=G0 &'0&$E"?"&
$".E0'2'3K4&*'F/2"E'0"? ?$,=$"3/"?&C"%3%4&X98497ZD%,,-$./%&.'*"?&(,'*&$E"&.'0."#$&'(&
+01(+% , "2+0(3%+3$2%P & $E=$ & '+, & "0>/,'0*"0$ & ?$,+.$+,"? & $E"&
;:5%:.-++)4)*-')#1%@0AB#"C+ .E'/."? & =>=/2=F2" & $' & +?4 & =0< & *',"'>",4 & $E=$ & $E"," & /? & =0&
O7%*%&50(',*=$/'0&/0$",(=."?&=0<,"?"0$=$/'0&C"%3%4&O)5DP& /0">/$=F2K&=&<"(=+2$&'#$/'0^&<"?/30",? &.=0&.=,"(+22K&?"2".$&
Q/?."22=0"'+?%&R%S%:%&)'*#+$",?&=0<&?'./"$KP&-'./=2&/??+"?% $E=$&<"(=+2$&$'&3"0$2K&0+<3"&$'&$E"&<"?/,"<&F"E=>/',%&\'&$E"&
F"?$ & '( & *K & H0'G2"<3"4 & $E/? & /<"= & E=? & 0'$ & F""0 & ?$+"<&
D010"-.%>0"$+ "[#2/./$2K&/0&$E"&<'*=/0&'(",?+=?/>"&$".E0'2'3K4&=2$E'+3E&
O+*=0&M=.$',?% <"(=+2$ & '#$/'0? & .=0 & F" & .'0?/<","< & ?+33"?$/'0? & (,'* & $E"&
.'*#+$",&X984%9:aZ%&M/0=22K4&+1%2+(1)&"0?+,"?&==,$/.+2=,&
89>?E2F:>8E9 F"E=>/',&$E,'+3E&$E,"=$?&=0<&(',."&X:Z%&50&E/?&(,=*/03&'(&$E"&
B=2+"? & +0<",2K & #",?+=?/'0% & 5*#2/./$ & /0 & #",?+=?/'0 & /? & $E"& (/"2< & '( & #",?+=?/>" & $".E0'2'3K4 & M'33 & "[#2/./$2K & "[.2+<"<&
@+<3*"0$ & $E=$ & '0" & F"E=>/', & ', & '+$.'*" & /? & F"$$", & $E=0& .'",./'0&=?&?$/0.$&(,'*",?+=?/'0&X984%97Z&=0<&&=2G=K?&
=0'$E",%&T+$&F"$$",&(',&GE=$U&60<&(',&GE'*U +0"$E/.=2&X984%::aZ&=0<&%&\E+?4&$E","&E=?&F""0&2/$$2"&?$+ "&$".E0'2'3K&.'**+0/$K%
O","4&5&,"?#'0<&$'&$E"&.=22&(',&.'0$,/F+$/'0?&=F'+$&"$E/.=2&
/??+"? & $' & $E" & G',H?E'# & VI5J)P & I",?+=?/'04 & 50(2+"0."4& ,;HF&%=&9=8>8,&%2&=8D9
J+<3"4 & =0< & )'",./'0 & $E,'+3E & *'F/2" & <">/."?W & XYZ% & & QK& B=2+" & -"0?/$/>" & !"?/30 & CB-!D & /? & = & $E"',"$/.=2 & =0<&
=##,'=.E&$'&"$E/.?&/?&(,'*&$E"",?#".$/>"&'(&E+*=0&!"#$%& *"$E'<'2'3/.=2 & (,=*"G',H & /0$"0<"< & $' & E"2# & <"?/30",?&
'#=,$/.+2=,2K & *',=2 & >=2+"? & ?+.E & =? & (=/,0"??4 & =+$'0'*K4& =..'+0$ & (', & E+*=0 & >=2+"? & /0 & = & #,/0./#2"< & =0<&
#,/>=.K4 & =0< & E+*=0 & G"2(=,"% & 6($", & ?.+??/03 & *K& .'*#,"E"0?/>" & G=K & $E,'+3E'+$ & $E" & <"?/30 & #,'."?? & X9:Z%&
+0<",?$=003&'(&=0<&,"2=$/'0?E/#&$'&I5J)4&5&/0$,'<+."&$E"& B-!&"*#E=?/L"?&>=2+"?&'(&*',=2&/*#',$&=0<&$E+?&?#"=H?&$'&
B=2+" & -"0?/$/>" & !"?/30 & $E"',K & =0< & *"$E'<'2'3K & X9:Z% & 5& "$E/.=2&.'0.",0? &/0&$".E0'2'3K&<"?/30%&R"K&B-!&("=$+,"?&
$E"0&?E'G&E'G&"$E/.=2&3'=2?4,/0./#2"?4&=0<,'F2"*?&'(& /0.2+<"&/$?&.'*#,"E"0?/>"&=$$"0$/'0&$'&?$=H"E'2<",?&=0<&/$?&
I5J)&.=0&F"&(,=*"<&/0&$",*?&'(&>=2+"?&=0<&>=2+"&$"0?/'0?% $,/#=,$/$"&*"$E'<'2'3K&X9:Z%
789:%;92%7&?=F;=8,&%>&:G9EHEDI B-! & <"*=0 & =$$"0$/'0 & $' & F'$E & ,".$ & =0< & /0,".$&
5 & =##,'=.E & I5J) & (,'* & $E" & #",?+=?/>" & $".E0'2'3K& ?$=H"E'2<",?P & 0'$ & '02K&$E'?" & GE'& +?" &$E" &$".E0'2'3K & F+$&
.'**+0/$K% &I",?+=?/>" & $".E0'2'3K & .'0.",0? & $E" & +?" & '(& $E'?" & GE' & =," & =((".$"< & FK & /$? & +?"% & B-! & =2?' & ?+33"?$?&
$".E0'2'3/.=22K & 3"0",=$"< & ', & *"=$"< & /0(',*=$/'04& #=,$/.+2=,&=$$"0$/'0&$'&>+20",=F2"&?$=H"E'2<",?%&50&$E"&.=?"&
'(&*'F/2"",?+=?/'04&$E/?&*=K&/0.2+<"&$""0?&X749aZ4&;%-%&
)'#K,/3E$ & e & :899 & (', & $E" & /0>/<+=2 & #=#",? & FK & $E" & #=#",?b & =+$E',?%& c=$/0'?&=0<&F2=.H?&X:SZ4&=0<&6(,/.=0?&X:7Z&GE'&,"2K&E"=>/2K&
)'#K/03&",*/$$"<&'02K&(',,/>=$"&=0<&=.=<"*/.+,#'?"?%&\E/?&>'2+*"& '0&$E"/,&*'F/2"E'0"?&(',&.'**+0/.=$/'0&=0<&d"F&=.."??4&
/?+F2/?E"<&=0<&.'#K,/3E$"<&FK&$E"&&"$',?&'(&I5J):899%
=0< & *=K & 0'$ & E=>" & F,'= "% & -+.E & 3,'+#? & ?E'+2< & F" & 0"/$E", & 0"32".$"< & 0',&
=F+?"<&/0&$E"&<"?/30&'(&*'F/2"&I5J)&$".E0'2'3/"?%
B-!b?&*"$E'<'2'3K&/0.',#',=$"?&$".E0/.=24&"*#/,/.=24&=0<&
!"#!$%&'()*+#,$-&+.(&+"#-/*0$!1#+!()*+#,$-&+.(&+"#-*!"#!$2#* Q#7$2-"# * #"&$-< * R6$3 * =$)+$,$ * &1(& * A!"$2!+"#D * +- * ()3(4-*
1"3 * -4-&$5 * 6$(&'2$- * -'%%"2& * "2 * '#7$25+#$ * %(2&+!')(2* '#_'-&+6+$7< *-+#!$ *+& *-$$5- *&1(& * #"*-"!+$&4*!"')7* 6'#!&+"#*
,()'$-/ * 85%+2+!() * +#,$-&+.(&+"#- * (772$-- * -&(9$1")7$2* 3+&1"'&*-"5$*('&1"2+\$7*'-$-S*ABD/*`(3*.+,$-*.",$2#5$#&-*
!"#!$%&+"#- * "6 * ,()'$- * (#7 * &1$ * 1'5(# * 2$-%"#-$ * &" * &1$* (*)+5+&$7*('&1"2+&4*&"*'-$*!"$2!+"#/*H$%)"4+#.*!"5%'&$2-*
(2&+6(!&/ * :"2 * $;(5%)$< * (# * $5%+2+!() * -&'74 * 5+.1& * %2$-$#&* 6"2 * )(3 * $#6"2!$5$#& * 1(- * %"&$#&+() * =$#$6+&- * (#7 * !"-&-< * (-*
%(2&+!+%(#&-*3+&1*-!$#(2+"-*7$-+.#$7*&"*%'-1*&1$*="'#7(2+$-* !"5%'&$2-*)(!9*&1$*!"#&$;&'()*(3(2$#$--*(#7*_'7.5$#&*"6*(*
"6 *!$2&(+# * ,()'$- * +#* &1$* 7$-+.# *"6 *%$2-'(-+,$ * &$!1#")".4<* 1'5(#*=$+#./*^1+)$*&1+-*5+.1&*=$*-$$#*(-*(#*"%%"2&'#+&4*&"*
-+5+)(2*&"*>(.$*(#7*?2(4@-*2$!$#&*-&'74*"6*$&1+!()*2$-%"#-$-* '-$*!"5%'&$2-*6"2*6(+2*$#6"2!$5$#&<*'#!)"'7$7*=4*1'5(#*
&" * %$2-'(-+,$ * &$!1#")".+$- * ABCD/ * :+#())4< * !"#!$%&'()* =+(-$-<*+&*!(#*=$*-'2%2+-+#.)4*7+66+!')&*&"*%2"7'!$*!"5%'&$2*
+#,$-&+.(&+"#-*$;%)"2$*&1$*,()'$-*(&*1(#7*(#7*&1$*&$#-+"#-* -4-&$5- * &1(& * (2$ * 62$$ * "6 * =+(-/ * H$-+.#$2- * !(# * $#!"7$*
=$&3$$#*&1$5/*01$*2$5(+#7$2*"6*&1+-*%(%$2*!"5%2+-$-*-'!1* '#!"#-!+"'- * =+(-$- * +# * &1$ * -4-&$5< * '#+#&$#7$7 * =+(-$- * !(#*
(*!"#!$%&'()*+#,$-&+.(&+"#/ $5$2.$*+#*'-$<*(#7*#$3*=+(-$-*!(#*(2+-$*(-*(*-4-&$5*+-*'-$7*
+#*#$3*!"#&$;&-*ATPD/*:'2&1$2<*()&1"'.1*1'5(#-*"6&$#*=)(5$*
8)-$31$2$<*E*1(,$*(2.'$7*&1(&*FGH*+-*3$))I-'+&$7*&"*(772$--*
!"5%'&$2- * 6"2 * =(7 * "'&!"5$-< * !"5%'&$2- * )(!9 * 5"2()*
$&1+!() * !"#!$2#- * +# * %$2-'(-+,$ * &$!1#")".4 * AJD/ * 01$ * FGH*
(!!"'#&(=+)+&4 * ATC(.$*(#7*?2(4*2$%"2&*&1(&*-&'74*%(2&+!+%(#&-*
E*!"#-+7$2*&12$$*!)(--$-*"6*,()'$-*2$)(&$7*&"*5"=+)$*>ELM* 6"'#7*!"$2!+,$*R-1"!9*&(!&+!-S*&"*=$*(!!$%&(=)$*+6*+&*3(-*&1$*
&$!1#")".+$-N * ,()'$- * #$!$--(2+)4 * +5%)+!(&$7 * =4 * &1$ * >ELM* %$2-"#@-*"3#*!1"+!$*&"*'-$*&1$*-4-&$5*ABCD/*01+-*2$&'2#-*'-*
(%%2"(!1< * ,()'$- * +5%)+!(&$7 * =4 * %(2&+!')(2 * 5$&1"7- * "6* &"*"'2*$(2)+$2 *7$6+#+&+"#*"6*('&"#"54N *R%$"%)$@- *(=+)+&4*&"*
%2"5"&+#.*=$1(,+"2*!1(#.$<*(#7*,()'$-*+5%)+!(&$7*=4*&1$* 7$!+7$< *%)(#<*(#7*(!& *+#*3(4- *&1(&*&1$4*=$)+$,$*3+))*1$)%*
7$-+2$7 * $#7-/ * E * ()-" * !"#-+7$2 * ,()'$ * &$#-+"#- * (#7 * 1"3* &1$5*&"*(!1+$,$*&1$+2*."()-S*ATBD/*
7+66$2$#!$- * +# * ,()'$- * 5(4 * #"#$&1$)$-- * )$(7 * &" * &1$ * -(5$*
=$1(,+"2/*E*3+))*72(3*%(2&+!')(2)4*'%"#*54*$(2)+$2*(#()4-+-* K"3$,$2<*'-$2-*#$$7*+#6"25(&+"#*&"**(--$--*&1$*-'+&(=+)+&4*"6*
AJD * (#7 * O$27+!1$,-94 * (#7 * L$'$#-!13(#7$2@- * $&1+!()* &1$*-4-&$5*&"*&1$+2*."()-/*O$27+!1$,-94*(#7*L$'$#-!1(#7$2*
%2+#!+%)$-*6"2*%$2-'(-+,$*&$!1#")".4*APD/ -&(&$*&3"*$&1+!()*%2+#!+%)$-*2$)(&$7*&"*7+-!)"-'2$N*
FEV 01$ * !2$(&"2- * "6 * ( * %$2-'(-+,$ * &$!1#")".4 * -1"')7*
+,-&./01-2&34&5*'6 7+-!)"-$ * &1$+2 * 5"&+,(&+"#-< * 5$&1"7-< * (#7 * +#&$#7$7*
01$ * >ELM * $#7$(,"2 * +- * +#&+5(&$)4 * &+$7 * &" * &1$ * ,()'$ * "6* "'&!"5$-< * $;!$%& * 31$# * -'!1 * 7+-!)"-'2$ * 3"')7*
('&"#"54 * AJD/ * Q'&"#"54 * R2$6$2- * &" * %$"%)$@- * (=+)+&4 * &"* -+.#+6+!(#&)4*'#7$25+#$*(#*"&1$23+-$*$&1+!()*."()/
7$!+7$< *%)(#<*(#7*(!& *+#*3(4- *&1(&*&1$4*=$)+$,$*3+))*1$)%*
&1$5*&"*(!1+$,$*&1$+2*."()-S*ATBD/*>ELM*&$!1#")".4*&13(2&-* FEEV>$2-'(-+,$*&$!1#")".+$-*5'-&*#"&*5+-+#6"25*+#*"27$2*
('&"#"54*31$#*+&*+-*'-$7*&"*.$&*%$"%)$*&"*7"*&1+#.-*&1(&*(2$* &"*(!1+$,$*&1$+2*%$2-'(-+,$*$#7/*APD
(.(+#-& *&1$+2*"3#*."()- *U$/./< *&"*3(-&$*5"#$4*"#*'-$)$--* W#$*-&$%*=$4"#7*&1+-*+-*&1$*,()'$*"6*&+5'(2"3)*'+-"+0 )AJDN*
%2"7'!&-V/*O'&*>ELM*!(#*()-"*'%1")7*('&"#"54<*31$#*+&*+-* &1(&*%$"%)$*-1"')7*#"&*"#)4*=$*+#6"25$7<*='&*-1"')7*1(,$*(#*
7$%)"4$7 * +# * -'%%"2& * "6 * (# * +#7+,+7'()@- * ."()- * U$/./< * &"* $;%)+!+&*"%%"2&'#+&4*&"*"66$2*"2*3+&11")7*!"#-$#&/*:2+$75(#<*
=$!"5$ * 5"2$ * (!&+,$V/ * E#7$$7< * W+#(-I?'99"#$# * 1(-* K"3$< * (#7* :$)&$# *+7$#&+6+$7* -+;* !"5%"#$#&- * "6*+#6"25$7*
%2"%"-$7*&1$*7$,$)"%5$#&*"6*&1$"24*(#7*5$&1"7")".4*6"2* !"#-$#&*ATTDN**'+-"+0*!"5%2+-$-*%'4.+0$(&+"--7)*'2/"0"+*"7 )
!"#$%&'()*#$+,")-.//'(0)-1-0"2-*(-*(#*+5%"2&(#&*7+2$!&+"#* $,(""2"+0<*(#7*2&+&2$4)3&-0($*0&'+<*31+)$*6"2*!"#-$#&*&"*=$*
6"2*&1$*>$2-'(-+,$*0$!1#")".4*!"55'#+&4*ATXD/ &+5'(2"3*2$a'+2$-*#"&*"#)4*3&-*4'-.("<*(-*O$27+!1$,-94*(#7*
K"3 * 7" * &1$ * >ELM * (%%2"(!1$- * -&(#7 * 3+&1 * 2$-%$!& * &"* L$'$#-!1(#7$2 * $;1"2&< * ='& * ()-" **'2/("#"+-&'+/ * >ELM*
('&"#"54Y *Q- * :".. * #"&$-< * %$2-'(-+"# * +5%)+$- * ,")'#&(24* &$!1#")".+$-*&1(&*(2$*'#7$25+#$7*=4*+#6"25$7*!"#-$#&b6"2*
!1(#.$ * ATC< * %/TZD/ * E#6)'$#!$< * &""< * -'..$-&- * ,")'#&(2+#$--[* $;(5%)$<*?(%&$+#*(#7*8!9)$-@-*%$2-'(-+"#*%2"6+)+#.*ATZDb
+#7$$7< *M+()7+#+ *-1"3- *1"3*&"*2$!".#+\$ *(#7*!+2!'5,$#&* 7$-$2,$*1$+.1&$#$7*-!2'&+#4*2$.(27)$--*"6*&1$*(!!$%&(=+)+&4*
+#6)'$#!$*(&&$5%&-*A]D/*M$#&2()*&"*&1$*+.3,"*+-*+-*&1$*+7$(*"6* "6*&1$+2*$#7-/*Q-*c+!1()-9+*ATdD*(#7*?(%&$+#*(#7*8!9)$-*
4&!"(0$(&$+)/$0"(+$4&-2)ABBDN*&1"'.1*&1$*7$-+.#$2-*!1""-$*(* ATZD *%"+#& *"'&<* &1$ *%2"=)$5 *+- *&1(& * &1$ *#(&'2() * +#!$#&+,$-*
&4%+!())4*R=$-&S*"%&+"#*6"2*&1$*7$6(')&<*+#7+,+7'()-*()3(4-* 5(4*=$*(.(+#-&*$,$#*7+-!)"-'2$<*)$&*()"#$*+#6"25$7*!"#-$#&/
1(,$*&1$*62$$7"5*&"*!1""-$*"&1$2*"%&+"#-*(!!"27+#.*&"*&1$+2*
"3#*."()- *(#7*9#"3)$7.$/ *:+#())4< *&1$*6"2!$ *"6*!"$2!+"#* +,-&./01-2&34&7-/82
+#1$2$#&)4*7+5+#+-1$-*&1$*('&"#"54*"6*&1$*!"$2!$7*ABD/* W#!$ * 3$ * 1(,$ * 7$!+7$7 * (&&$5%& * &" * !1(#.$ * (#"&1$2@-*
=$1(,+"2<*3$*1(,$*(*#'5=$2*"6*5$(#-*(,(+)(=)$*6"2*7"+#.*
^1$# * 5+.1& * !"$2!+"# * =4 * !"5%'&$2- * =$ * _'-&+6+$7Y * Q-* -"/ * ^1+)$< * 6"2 * $;(5%)$< * &1$ *+.3,"* (%%2"(!1 * +5%)+$- * (*
!"#$%&'("# ) *+&,"-%.* ) /0# ) %-/('+-&%-1 ) &,0%&+.2 )!"#$%&$'()* $0)$,+)+-?.)0/)!+#.'".%0-G
+-&0*!"..+.)")-'*3+#)0/)*+"-.)45625789)
BI J,+)%-$+-?+?)0'$&0*+)0/)"-;)!+#.'".%<+)$+&,-0(01;)
:"-; ) !+#.'".%<+ ) .$#"$+1%+.2 ) .'&, ) ". ) .+(/=*0-%$0#%-12) .,0'(?)-+<+#)3+)0-+)$,"$)C0'(?)3+)?++*+?)'-+$,%&"()
!+#.0-"(%>"$%0-2)$"%(0#%-12)"-?).0&%"()&0*!"#%.0-)45782)#+(;) %/ ) $,+ ) !+#.'".%0- ) C+#+ ) '-?+#$"E+- ) C%$,0'$ ) $,+)
0- ) %-/0#*"$%0- ) "30'$ ) $,+ ) '.+#@. ) &0-$+A$ ) "-? ) "&$%<%$%+.9) $+&,-0(01;)0#)%/)$,+)0'$&0*+)0&&'##+?)%-?+!+-?+-$(;)
B-?++?2 ) $C0 ) 0/ )D+#?%&,+<.E; ) "-? ) F+'+-.&,C"-?+#@.) 0/)!+#.'".%0-
!#%-&%!(+.)!0%-$)$0)!#'+&,-)".)")<"('+)0/)!"#$%&'("#)&0-&+#-G
BBI J,+)*0$%<"$%0-.)3+,%-?)$,+)+"$%0-)0/)")!+#.'".%<+)
BHI J,+)+"$0#.)0/)")!+#.'".%<+)$+&,-0(01;)*'.$)+-.'#+) $+&,-0(01;).,0'(?)-+<+#)3+).'&,)$,"$)$,+;)C0'(?)3+)
$,"$)%$)#+1"#?.)$,+)!#%<"&;)0/)'.+#.)C%$,)"$)(+".$)".) ?++*+? ) '-+$,%&"( ) %/ ) $,+; ) (+? ) $0 ) *0#+ ) $#"?%$%0-"()
*'&,)#+.!+&$)".)$,+;)#+1"#?)$,+%#)0C-)!#%<"&;9 !+#.'".%0-9
HI K+#.'".%<+ ) $+&,-0(01%+. ) #+(";%-1 ) !+#.0-"() HBBBI)J,+)W0(?+-)X'(+)0/)K+#.'".%0-G)J,+)+"$0#.)0/)")
%-/0#*"$%0- )"30'$ ) ") '.+# ) $0 )" ) $,%#? ) !"#$; )*'.$ ) 3+) !+#.'".%<+)$+&,-0(01;).,0'(?)-+<+#).++E)$0)!+#.'"?+)
&(0.+(;).'$%-%>+?)/0#)!#%<"&;)&0-&+#-.9)4L8 ")!+#.0-)0#)!+#.0-. )0/).0*+$,%-1)$,+;)$,+*.+(<+.)
C0'(?)-0$)&0-.+-$)$0)3+)!+#.'"?+?)$0)?09)4L8
:03%(+ ) !,0-+. ) &"- ) &"!$'#+ ) "- ) '-!#+&+?+-$+? ) "*0'-$ ) 0/)
%-/0#*"$%0- ) "30'$ ) $,+ ) '.+#2 ) .'&, ) ". ) (0&"$%0- ) &00#?%-"$+.2) Q(( ) $,#++ ) !#%-&%!(+. ) /0&'. ) 0- ) '-"&&+!$"3(+) +-?. ) /0#)
&"((.2)"-?)$+A$)*+.."1+.2)"&&+-$'"$%-1)$,+)-++?)/0#)"$$+-$%0-) !+#.'".%0-9 ) J,+; ) !#0<%?+ ) -0 ) 1'%?"-&+ ) ". ) $0 ) C,"$ ) +-?.)
$0)!#%<"&;)45M89)D'$)&,"--+(.).'&,)".)"'?%02)!,0$01#"!,.2) C0'(?)3+)?+.%#"3(+9)Q$$+-$%0-)$0)<"('+.)&"-)(+"?)$0)?+.%#"3(+)
"-?)!#0A%*%$;)"(.0)&"!$'#+)%-/0#*"$%0-)"30'$)0$,+#.)-+"#3; +-?. ) /0# ) 3+,"<%0# ) &,"-1+9 ) B-?++?2 ) *'&, ) !+#.'".%<+)
N%-?%#+&$).$"E+,0(?+#.)4O89)B-)$,+%#)+*!%#%&"().$'?;)0/)$++-) $+&,-0(01;),".)+A!(%&%$(;)$"#1+$+?),+"($,)0#)+-<%#0-*+-$"()
."/+$;).&+-"#%0.2)P>+.E%.)"-?)&0((+"1'+.)(+"#-+?)$,"$)$++-.) .'.$"%-"3%(%$;9 )Q($,0'1,)$,+.+)"#+)("'?"3(+)10"(.2)!+#,"!.)
C+#+)*0#+)#+('&$"-$ )$0)%-?%#+&$(;).,"#+)%-/0#*"$%0-)"30'$) C+ ) .,0'(? ) "(.0 ) 3+ ) ?+.%1-%-1 ) !+#.'".%<+ ) $+&,-0(01; ) $,"$)
$,+%#)&0-$+A$)"-?)"&$%<%$%+.)C%$,)/#%+-?.@)!"#+-$)$,"-)$0).,"#+) ,+(!.)'.)$0)0<+#&0*+)0'#)#"&%"()3%".+.)Y4#"".(2*4#(2*5'&$I2)
.'&, ) %-/0#*"$%0- ) C%$, ) $,+%# ) 0C- ) !"#+-$. ) 4O89 ) J,'.2 ) %- ) ") &0-$#0()0'#)"-1+#)Y,&12)"$$I2)"-?)(+"#-)$0),+(!)"-?)#+(;)0-)
*03%(+)&0-$+A$2)%$)%.) )%*!0#$"-$)$0)&0-.%?+#)$,+)!#%<"&;)0/) 0'#)-+%1,30#.)Y/#%$/I9)S'#$,+#2)%$)%.)%*!0#$"-$)$0)'-?+#.$"-?)
&0*!"-%0-.)"-?)3;.$"-?+#.N-0$)0-(;)$,+)'.+#9 $,+)<"('+.)0/)$,0.+)C+)"#+)?+.%1-%-1)/0#9
Q($,0'1,)!#%<"&;)%.)%*!0#$"-$)$0)*"-;)KBFP).$#"$+1%+.2)C+)
3&'(#$/#,)4*,)
.,0'(? ) 10 ) 3+;0-? ) !#%<"&; ) $0 ) "&&0'-$ ) /0# ) <"('+. ) .'&, ) ".) J,+)*0.$)03<%0'.)<"('+)$+-.%0-.)%-)KBFP )$+&,-0(01;)!%$)
'.")/'/-0 * ,(%#/"$-2 ) "-? ),&12)"$$) 45R8 ) C,+- ) $,+; ) "#+) ?+.%#+? ) 3+,"<%0# ) &,"-1+. ) "-? ) ) $,+ ) <"('+. ) $,+; ) %*!(%&"$+)
%*!(%&"$+? ) 3; ) $,+ ) *+"-. ) '.+? ) $0 ) "//+&$ ) 3+,"<%0#9 ) ) S0#) "1"%-.$)$,+)%-$+-$%0-)$0)&,"-1+)3+,"<%0#)"-?)*+$,0?.)/0#)
+A"*!(+2 ) &0-.%?+# ) $,+ ) <"('+ ) 0/ )'.")/'/-2 ) T!+0!(+@.) ?0%-1).09)J,"$)%.2)+-?.)&"-)3+)%-)$+-.%0-)C%$,)*+"-.9)Z+)
'-?+#.$"-?%-1 ) 0/ ) C,0 ) $,+; ) "#+ ) 0<+# ) $%*+U ) 45R89 ) J,+) .++)!#0*0$%-1),+"($,2)+-<%#0-*+-$"().'.$"%-"3%(%$;2)"-?).0)
!+#.'".%<+).$#"$+1;)0/)$(,'&1*1")')32)!#0<%?%-1)T*+"-.)$0) 0-2)<+#.'.)!#+.+#<%-1)"'$0-0*;2)!#%<"&;2)"-?).0)0-9)
03.+#<+)0$,+#4.8)C,0)"#+)!+#/0#*%-1)$,+%#)$"#1+$)3+,"<%0#.)
"-?)$0).++)$,+)0'$&0*+.)0/)$,+%#)3+,"<%0#U)45782).,0'(?)3+) [0C+<+#2)$,+.+)"#+)-0$)$,+)0-(;)$;!+.)0/)$+-.%0-.9))S%#.$2)$,+)
*0#+)+//+&$%<+ )C,+-)03.+#<+#. ).,"#+)"-)%?+-$%$;)C%$,)$,+) "&$ ) 0/ ) !+#.'".%0- ) %-,+#+-$(; ) !#%<%(+1+. ) $,+ ) <"('+. ) 0/ ) $,+)
03.+#<+?9)S'#$,+#2)%/)C+)"#+)T*"##%+?U)$0)0'#)&+(()!,0-+.2) !+#.'"?+#)0<+#)$,0.+)0/)$,+)!+#.'"?+?9)D;)".E%-1);0' )$0)
C+ )C%(( )3+ )*0#+)"$$"&,+? )$0)"!!(%&"$%0-. )$,"$ )#+/(+&$ )0'#) &,"-1+);0'#)3+,"<%0#2)B)"*).";%-1)$,"$)*;)<"('+.)"#+)*0#+)
%?+-$%$%+.9)Q.)"-0$,+#)+A"*!(+2)&(%#/"$- *"-? ),&12)"$$) "#+) %*!0#$"-$)$,"-);0'#)<"('+.)Y0#)"$)(+".$2)$,+)<"('+.);0').++*)
%*!(%&"$+?)3;)$+&,-0(01%+.)$,"$)'.+)$,+)$%33"$/'()).$#"$+1;9) $0)3+)"&$%-1)0-I9)B-)$,+)3+.$)&".+2)".)%-)3+,"<%0#)&,"-1+)
Q($,0'1,).'11+.$%0-.)*'.$)3+)1%<+-))"$)$,+)#%1,$)$%*+)"-?) .'!!0#$).;.$+*.2)$,+)!+#.'"?+#)"-?)$,+)!+#.'"?+?)"1#++)0-)")
!("&+)$0)"//+&$)3+,"<%0#)45682).'11+.$%0-.).,0'(?)3+)!0(%$+) <"('+ ) .'&, ) ". ) ,+"($, ) 0# ) +-<%#0-*+-$"( ) .'.$"%-"3%(%$;\ ) $,+)
"-? ) "((0C ) $,+ ) '.+# ) $0 ) #+*"%- ) !+"&+/'( ) "-? ) &0*!0.+?N !+#.'"?+# ) !#0<%?+. ) %-/0#*"$%0- ) 0# ) .'!!0#$ ) $0 ) ,+(! ) $,+)
'-(+..)$,+#+)%.)"-)0<+##%?%-1)#+".0-)$0)0$,+#C%.+9) !+#.'"?+?)"&$)%-)"&&0#?"-&+)C%$,)$,%.).,"#+?)<"('+9)
]+&0-?2 ) !+0!(+ ) *"; ) "1#++ ) 0- ) <"('+. ) 3'$ ) ?%."1#++ ) 0-)
!"#$%&'(#)$*+$#,-)$./&01#/$%&'(#)2
!#%0#%$%+.9)Z+)*%1,$)"1#++)$,"$)+-<%#0-*+-$"().'.$"%-"3%(%$;)
Q.)-0$+?)%-)$,+)%-$#0?'&$%0-2)<"('+.)'-?+#(;)!+#.'".%0-9)B-)
%.)C0#$,C,%(+N3'$)B)*%1,$)#"$+)$,+)&0*/0#$)0#)+A&%$+*+-$)
!+#.'"?%-1).0*+0-+)$0)"&$)%-)0-+)C";)"-?)-0$)"-0$,+#2)C+)
0/)?#%<%-1)".)*0#+)%*!0#$"-$9)B-?++?2)X0E+"&,)&0*!"#+?)
"#+)"..+#$%-1)$,"$)$,+)?+.%#+?)3+,"<%0#)C%(()#+.'($)%-)")3+$$+#)
%-?%<%?'"(.@)<"('+).;.$+*.).0(+(;)0-)$,+)3".%.)0/)?%//+#+-&+.)
0'$&0*+9 ) D+$$+# ) /0# ) C,"$V ) D+$$+# ) /0# ) 0'# ) ,+"($,2 ) /0# ) 0'#)
%-)$,+%#)#"-E%-1.)0/)").+$)0/)!#+?+/%-+?)<"('+.)4R589
/"*%(;@. )."/+$;2)/0#)-"$%0-"().+&'#%$;2)/0#)$,+)+-<%#0-*+-$2)
"-?).0)0-9)B*!(%&%$)%-)+<+#;)"&$)0/)!+#.'".%0-)%.)")<"('+)$,+)
5&6#$7#"&%4*08$-4++#0#,/$%&'(#)
!+#.'"?+#)C"-$.)$0).'!!0#$2)")$"#1+$)<"('+9
S%-"((;2))!+0!(+)*";)"1#++)0-)")?+.%#+?)3+,"<%0#2)3'$),"<+)
D+#?%&,+<.E;)"-?)F+'+-.&,C"-?+#)"??#+..)$,#++)!#%-&%!(+.) ?%//+#+-$ ) #+".0-. ) /0# )<"('%-1 )$,"$ )3+,"<%0#9 )S0# ) +A"*!(+2)
/%<+)!+0!(+)*%1,$ )&,00.+)$0)?#%<+)3+(0C)$,+).!++?)(%*%$2)
!"#$ % &'( % )$!*( % '+, % (!"-',-.% )' % '/!0 % )$! %!"#1 % )' % 2(')!#)% Y?%Z#I6!-%O!3-?P9%C-3+!&.B&*$0"$+-,K%C)",&'(3%T"2)'6'50%U!3*"%
$"%&'(1%)'%2("#)*#! %')*+%'1%)'%(!34#!%3!2!,3!,#!%',%&'(!*5,% OLVVRP9%QNFF?
'*6%",3%2(')!#) %,"'+-,"!.$&/0*+'(1%'(%)'%(!34#!%)$!%,!!3%&'(% A?8'559%D?^?%@,#(!"-*,5%2!(-4"-*',%)$('45$%:'/*6*)0?%@,%D?^?%8'55%
'*6%3(*66*,5%",3%#',)(*/4)!%)'%&,1+*-,2&,'"!.$0$'"+,"3+!+'(4 ",3%Y?%Z#I6!-%O!3-?P9%C-3+!&.B&*$0"$+-,K%C)",&'(3%T"2)'6'50%
U!3*"%OLVVRP9%FQQNFWM?
7-%8'55%2'*,)-%'4)9%)$!%:'/*6!%2$',!%*-%",%*,)*:")!%3!;*#!%
<=>?%@&%*)%3'!-%,')%-$"(!%'4(%5'"6-9%/4)%(")$!(%$"-%5'"6-%'&%*)-% FV?8'559%D?^?%B&*$0"$+1&.>&/),-!-L(D.F$+,L.8-2A0'&*$.'- .
'+,9%+!%&!!6%/!)("0!3%?%B$!%-":!%+'463%-!!:%)'%$'63% 8)",L&.M)"'.M&.>)+,N.",@.O-K.U'(5",%b"4&:",,%OLVVMP?%
&'(%;"64!-?%C422'-!%)$")%:0%$*5$!-)%;"64!%*-%)$!%-"&!)0%'&% FF?8(*!3:",9%D?9%c'+!9%Y?9%",3%8!6)!,9%Z?%@,&'(:!3%T',-!,)%*,%
:0% #$*63(!,? % @& % @ % "3'2) % " % :'/*6! % "226*#")*', % )' % $!62 % :!% )$!%U'\*66"%D('+-!(.%@:26!:!,)*,5%]"64!NC!,-*)*;!%Y!-*5,?%@,%
";'*3%-2!!3*,59%",3%*)%-$'+-%:!%2*#)4(!-%'&%2'6"(%/!"(-9%@% B*-/&&@+,L$.-%.')&.PQ').9"#"++.:,'&*,"'+-,"!.8-,%&*&,/&.-, .
+*66%/!%42-!)?%D!#"4-!%*)%#$"66!,5!- %:0%;"64!-9%@%-!!%)$!% ?($'&2.?/+&,/&$%OLVVLP?
"226*#")*',%"-%"%)$(!")%)'%:0%"4)',':09%",3%@%!E2!(*!,#!% FL?8(*!3:",9%D?9%b"$,9%K?c?%^(?9%",3%D'(,*,59%7?%]"64!%C!,-*)*;!%
2-0#$'6'5*#"6 % (!"#)",#! % G6!"3*,5 % :! % )' % 3(*;! % !;!,% Y!-*5,%",3%*,&'(:")*',%-0-)!:-.%B$(!!%#"-!%-)43*!-?%@,%K?%d$",5%
&"-)!(?%@,-)!"39%@%-$'463%/!%(!:*,3!3%'&%:0%;"64!%'&%-"&!)0? ",3%Y?%e"66!))"%O!3-?PK.%902",R8-2A0'&*.:,'&*"/'+-,.",@.
C","L&2&,'.:,%-*2"'+-,.?($'&2$D.S-0,@"'+-,$4%U?%Z?%C$"(2!%
@%-!!%)+'%"22('"#$!-%)'%"33(!--*,5%*,3*;*34"6%4-!(-H%;"64!-?% OLVVWP9%M[=NMRL?
8*(-)9%3!-*5,!(-H%;"64!%#'::*):!,)-%-$'463%/!%:"3!%#6!"(%
FM?8(*!3:",9%D?9%",3%S*--!,/"4:9%c?%D*"-%*,%#':24)!(%-0-)!:-?%
)$('45$%/(",3*,5%",3%)$!%*,&'(:!3%#',-!,)%2('#!--9%-'%)$")% 78C.>E:?%GT9%MOFAAWP9%MMVNM[R?
4-!(-%#",%:"I!%*,&'(:!3%#$'*#!-?%C!#',39%*,)!(&"#!-%-4#$%
"-%B'339%J'5!(-9%",3%K"0,!H-%*,&'(:")*;!%5('#!(0%-$'22*,5% F[?^'$,-',9%Ye?9%",3%U46;!09%^?U?%7##'4,)"/*6*)0%",3%#':24)!(%
3!#*-*',%-0-)!:-?%878C.P=K.FL%OFAAQP9%Q=NW[?
#"() % % -$'463 % /! % )"*6'("/6!? % B$!0 % -$'463 % 42$'63 % 4-!(%
"4)',':0%/0%"66'+*,5%4-!(-%)'%#$''-!%+$*#$%*,&'(:")*',% FQ?b"2)!*,9%U?%",3%Z#I6!-9%Y?%C!6!#)*,5%!&&!#)*;!%:!",-%)'%",0%
":',5 % ;"64!N6"3!, % '2)*',- % O!?5?9 % -4-)"*,"/*6*)09% !,3?%@,%B*-/4.B5H?F7?:I5.;? T"2)'6'50%U!3*"%OLVVRP9%FQNF=?
FR?U*#$"6-I*9%^?%Z)$*#"6%3",5!(-%'&%:'/*6!%2!(-4"-*',?%@,%D?^?%
!"#!$%&'"# 8'55%",3%Y?%Z#I6!-%O!3-?P9%C-3+!&.B&*$0"$+-,K%C)",&'(3%
7))!,)*', % )' % ;"64!- % :"0 % #',)(*/4)! % ,') % ',60 % )'% T"2)'6'50%U!3*"%OLVVRP9%FMRNF[L??
4,3!(-)",3*,5%!)$*#"6%*--4!-%'&%:'/*6!%K@ST%)!#$,'6'50G
F=?a*,"-Nb4II',!,9%c?%D!$";*'(%#$",5!%-422'()%-0-)!:-.%7%
/(*,5*,5 % "))!,)*', % )' % #',#!(,- % /!0',3 % 2(*;"#0 % ",3% (!-!"(#$%:'3!6%",3%"5!,3"?%@,%B*-/4.B5H?F7?:I5.;<<=9%`STC%
3*-#6'-4(!G/4) % "6-' % )' % *,#(!"-*,5 % )$!*( % -#'2! % ",3% QVMM%OLVV=P9%FW[NFRW?
!&&!#)*;!,!--G)$!*(%2'+!(%)'%3'%5''3%*,%)$!%+'(63?%84()$!(%
+'(I%-$'463%#6"(*&0%('6!%'&%)$!-!%;"64!-%)$('45$%!:2*(*#"6% FA?a*,"-Nb4II',!,9%c?%",3%c"(g4:""9%U?%%7%-0-)!:")*#%
&(":!+'(I%&'(%3!-*5,*,5%",3%!;"64")*,5%2!(-4"-*;!%-0-)!:-?%@,%
",3%)!#$,*#"6%*,;!-)*5")*',-%'&%K@ST%)!#$,'6'50?
B*-/4.B5H?F7?:I5.;<<=9%`STC%WFMR%OLVFVP9%[NF[?
()*)()#!)& LV?K"5!9%J?Z?%",3%b("09%T?%Z)$*#-%",3%2!(-4"-*;!%)!#$,'6'50.%7,%
F?76!"$:"39%B?9%!)%"6?%8*-$*,5%&'(%-4-)"*,"/*6*)0.%B$!%!&&!#)-%'&% !E26'(")'(0%-)430%*,%)$!%#',)!E)%'&%$!"6)$0%6*;*,5?%@,%B*-/4.S+*$'.
*,3*(!#)%",3%3*(!#)%2!(-4"-*',?%@,.56'4.73$'*"/'$.89:.;<<=9%7TU% :,'4.M-*N$)-A.-,.U0@L&.",@.:,%!0&,/&.')*-0L).C-3+!&.O&1+/&$9%
K(!--%OLVV=P? 85FH.M-*N$)-A.B*-/&&@+,L$.VJ<%OLVFVP9%FANLL?
L?7,3!(-',9%C?%T'!(#*',?%@,%>)&.?'",%-*@.5,/(/!-A&@+".-%. LF?J'I!"#$9%U?%>)&.U"'0*&.-%.902",.I"!0&$?%8(!!%K(!--%OFARMP?
B)+!-$-A)(%OLVVWP9%$))2.XX26")'?-)",&'(3?!34X!,)(*!-X#'!(#*', LL?B$"6!(9%J?%c?%",3%C4,-)!*,9%T?J?%U0@L&D.:2A*-1+,L.O&/+$+-,$.
M?D!(3*#$!;-I09%Y?%",3%S!4!,-#$+",3!(9%Z?%B'+"(3%",%!)$*#-%'&% "3-0'.9&"!')K.M&"!')K.",@.9"AA+,&$$K%h"6!%f,*;!(-*)0%K(!--%
2!(-4"-*;!%)!#$,'6'50?%878C%[L9%Q%OU"0%FAAAP9%QFNQ=? OLVV=P?
[?T*"63*,*9%J?D?%:,%!0&,/&D.>)&.?/+&,/&.-%.B&*$0"$+-,9%T'66*,-9% LM?B'339%K?U?9%J'5!(-9%h?9%",3%K"0,!9%C?^?%S435*,5%)$!%#"()%*,%
(!;*-!3%!3?%OFAA=P? )$!%-42!(:"(I!)1%c'+%:4#$%*-%!,'45$%*,&'(:")*',%&'(%&''3%
-$'22!(-i%@,%B*-/4.S+*$'.:,'4.M-*N$)-A.-,.U0@L&.",@.:,%!0&,/& .
Q?T\!-I*-9%7?9%!)%"6?%K"(!,)*,5%&(':%)$!%2'#I!).%]"64!%)!,-*',-%",3% ')*-0L).C-3+!&.O&1+/&$9%85FH.M-*N$)-A.B*-/&&@+,L$.VJ<.
)!#$,*#"6%3*(!#)*',%&'(%-!#4(!%",3%2(*;")!%2"(!,)N)!!,%:'/*6!% OLVFVP9%LMNLW?
-"&!)0?%@,%B*-/4.?EFB?.;-,:+'07.>?@.A5B7.8C. >-,:+'07.>?@.A5B7.8C. E@M.ANN7.8C.
DEF#++'0G8!$10H12H*I. J!?,1%G8!=10H12H*I. -HO,1$,G2:HO"1(H12H*I.
1%#',*2"#' 3/4"#5'6/*''
K%9102,%./0+,-12+#'0.3-'*). D,)1-+(,0+.'<.!'()*+,-.Q2#,02,.
80#9,-:#+;.'<.E#-(#0L"1(. QP10:,1.80#9,-:#+;.
E#-(#0L"1(. Q#0L$,+'0.>1-I.
E@M.ANN7.8C. QP10:,1.QKA.R>>7.8C.
EH?H!'P10G2:HO"1(H12H*I. SH3*'G:P10:,1H12H*I.
! !
"#$%&"'%!
"'3!'452267685)6+9!-./0+,12!
/0.+"#:.)1),-.P,.)-,:,0+.10.'9,-9#,P.10%.#0#+#1$.P'-I.<-'(.
5MH(H. /0<'-(1+#'0. #0+,-<12,:. 10%. )-,:,0+1+#'0. 4,HLH7. 5!/6Z.
1. -,:,1-2". )-'T,2+. 2-,1+#0L. U2''$V. ('O#$,. +,2"0'$'L#,:. +'.
Y#:2,$$10,'*:H..
,%*21+,. 10%. #0<'-(. +,,01L,-:. #0. '-%,-. +'. -,%*2,. +",#-.
,0,-L;.*:,H.N,,01L,-:.1-,.1$-,1%;.O,2'(#0L.2'0:*(,-:.10%. :;%&<=>'%:<;!
P#$$. <'-(. +",. 0,W+. L,0,-1+#'0. '<. P'-I,-:7. "'(,'P0,-:7. 3'9,-0(,0+:. 12-'::. +",. P'-$%. 1-,. 0'P. 2'((#++,%. +'.
(101L,-:.10%.)'$#2;.(1I,-:X.1.$'0L#+*%#01$.2"10L,.#0.+",#-. -,%*2#0L.![A.,(#::#'0:.10%.'0,.I,;.1-,1.<'-.#()-'9,(,0+.
"1O#+:. 2'*$%. "19,. "*L,. #()12+H. 5'P,9,-7. #+. #:. 0'+'-#'*:$;. #:.-,%*2+#'0.#0.%'(,:+#2.10%.),-:'01$.+-10:)'-+1+#'0.,0,-L;.
%#<<#2*$+. +'. ,0L1L,. P#+". +,,01L,-:. 10%. ,<<,2+. 2"10L,:. #0. *:1L,H. /0. +",. "'(,. ![A. #:. -,$,1:,%. )-#(1-#$;. #0. +",.
+",#-. 1++#+*%,:. '-. 12+#'0:H. N,,01L,-:. 1-,. '<+,0. (':+. L,0,-1+#'0. '<. ,$,2+-#2#+;7. +",. 2'(O*:+#'0. '<.L1:.10%.'#$.<'-.
('+#91+,%. O;. +",#-. ),,-. L-'*). 10%. P"1+. #:. 2*--,0+$;. U2''$V. ",1+#0L.10%.2'(O*:+#'0.'<.<*,$.#0.+-10:)'-+H.\#+"#0.+",.)1:+.
'-. U*02''$VH. N",. 2"1$$,0L,:. '<. +"#:. P'-I. 1-,. 0'+. '0$;. +",. A].;,1-:.+",-,."1:.O,,0.1.:+,1%;.#02-,1:,.#0.+",.0*(O,-.'<.
2-,1+#'0. '<. ),-:*1:#9,. ('O#$,. +,2"0'$'L#,:. +'. ,02'*-1L,. 1))$#102,:.#0.+",.('%,-0."'(,.2'*)$,%.P#+".L-'P+".#0.+",.
+,,01L,-:. +'. -,%*2,. +",#-. ,0,-L;. *:,7. O*+. +'. (1I,. +",:,. 'P0,-:"#). '<. ,0,-L;. "*0L-;. %,9#2,:. :*2". 1:. +*(O$,. %-#,-:.
+,2"0'$'L#,:. :*<<#2#,0+$;. U2''$V. +"1+. +",;. 1-,. %,:#-1O$,. 10%. 10%.)$1:(1.N^:.10%.10.#02-,1:,.#0.+",.*:,.'<.%,9#2,:.P#+".
:'2#1$$;. 122,)+1O$,. ,0'*L". +'. :*))'-+. 1%')+#'0. 10%. :+10%O;. <12#$#+#,:. _M`H. Y10;. '<. +",. ,$,2+-#21$. %,9#2,:.
1))-')-#1+#'0. O;. +,,01L,-:H. /0. 1%%#+#'0. +'. )-'9#%#0L. 2'0+-#O*+#0L. +'. +",. -#:,. #0. %'(,:+#2. ,0,-L;. 1-,. *:,%. 10%.
),-:'01$#:,%. 10%. 1LL-,L1+,. ,0,-L;. *:1L,. %1+1. 10%. :'(,+#(,:. 'P0,%. O;. +,,01L,-:H. ?,:,1-2". #0. +",. 8C. "1:.
,%*21+#'01$. #0<'-(1+#'0. #0. 1. (,10#0L<*$. P1;7. +",. ('O#$,. #0%#21+,%.+"1+.aMb.'<.+,,01L,-:."1%.1.N^7.(*:#2.:;:+,(.'-.
+,2"0'$'L#,:. P,. 1-,. %,:#L0#0L. P#$$. 1$$'P. <'-. 1))-')-#1+#'0. )"'0,.#0.+",#-.-''(:7.P#+".+P'.+"#-%:."19#0L.1$$.+"-,,._@c`H.
#0. U2''$V. P1;:. +",-,O;. <':+,-#0L. 10. 12+#9,. 2'((*0#+;. '<. K.:,)1-1+,.:+*%;.-,)'-+,%.+"1+.d]].:*-9,;,%.+,,01L,-:.1L,%.
+,,01L,-:.P",-,.#+.#:.2''$.+'.(#0#(#:,.,0,-L;.*:,H.. @c.+'@a.P,-,.2'$$,2+#9,$;.P1:+#0L.,0'*L".,0,-L;.+'.)'P,-.
d7e]A. :2"''$:. 10%. 1. +"#-%. '<. +",. ,0,-L;. O,#0L. *:,%. P1:. 1.
"()*+,!-./0+,12!
%#-,2+.2'0:,f*,02,.'<.U:+10%O;V.O,"19#'*-._@`H.
B0,-L;.8:,7.N,,01L,-:7.Y'O#$,.N,2"0'$'L#,:..
[*-. P'-I. '0. +",. U+1I#0L. '0. +",. +,,01L,-:V. )-'T,2+:.
4PPPH(1%d0-LH'-L6. P#$$. ,0L1L,. ;'*0L. ),')$,. 41L,%. @A&
@a@6. #0. -,%*2#0L. +",#-. 'P0. ),-:'01$. ,0,-L;. *:,. 10%. (1I,.
!"#$%&'()*+*,-..*/"%*)(0*&12&3&2456*#5#0%7*8$*)(0*#5#0%79*54)("%7:*
!"#$&1'*#0%;&))02*"16$*/"%*#%&35)0*512*5<520;&<*#4%#"707:*=(&7*3"64;0*&7*
.............................................................
#486&7(02*512*<"#$%&'()02*8$*)(0*02&)"%7*"/*>?@!,-..:* @
./+.#:.)-'O$,(1+#2.-*00#0L.:+*%#,:.P#+".+,,01L,-:.<-'(.1L,.
.
@d&@M. #0. :2"''$:. #0. +",. 8C. P",0. +",;. O,L#0. )-,)1-#0L. <'-.
3!QB. ,W1(#01+#'0:7. P,. +",-,<'-,. 1$:'. +1-L,+. )-,&+,,0:. +'.
,0:*-,. P,. 210. P'-I. +",. :1(,. :*OT,2+:. <'-. +",. c. ;,1-.
%*-1+#'0.'<.+",.)-'T,2+H.
!"#$%$&'( )*+,-'#( $,( +%%$%./'#( %"0+1/#( ','1-2( .#'( %*+%( 0$33( /'7$,'( %*'( +%%1$6.%'#( "7( )""3( +,/( 6'$,-( N)""3O( $#( "7%',(
3+#%( %*1".-*( +/.3%*""/4( 5*$#( 0$33( 6'( +)*$'&'/( %*1".-*( %*'( 'B%1'8'32($8!"1%+,%4(L1"8(#%./$'#("7('B$#%$,-(3$%'1+%.1'(+,/(
)1'+%$",( "7( 8"6$3'( %')*,"3"-$'#( 9)+33'/( :;<=( :+>'( ;( $,$%$+3(/'#$-,(#'##$",#(0'(*+&'($/',%$7$'/(%*1''(8+$,(3'&'3#(
<$77'1',)'?(%"('/.)+%'(%'',#(+6".%()*"$)'#(%*'2()+,(8+>'(%"( "7()""3,'##($,(%*'()",%'B%("7(%'',+-'14(5*'(7$1#%A(+,/('+#$'#%(
1'/.)'( ','1-2( .#'( +,/( !1"&$/'( 7''/6+)>( ",( ','1-2( .#+-'4( %"(+)*$'&'A($#(%*'()""3,'##(+##")$+%'/(0$%*(*+&$,-(/'#$1+63'(
:"6$3'( %')*,"3"-$'#( 0$33( +3#"( 6'( .#'/( %"( -+%*'1( ','1-2( %*$,-#( %*+%( "%*'1#( +#!$1'( %"( 9#.)*( +#( 3+%'#%( %')*,"3"-2( "1(
.#+-'( $,7"18+%$",( %*1".-*( #'37@1'!"1%( +,/( #',#$,-( )3"%*'#?A( %*'( #')",/( $#( )""3,'##( +##")$+%'/( 0$%*( +)%$",#( "1(
%')*,"3"-$'#A( 7"1( 'B+8!3'( /'%')%$,-( 0*$)*( %1+,#!"1%( +)%$&$%$'#( %*+%( -+$,( 1')"-,$%$",( 71"8( !''1#4( 5*'( %*$1/A( +,/(
8'%*"/#( +1'( 6'$,-( .#'/A( $,( +//$%$",( %"( 8"1'( .#.+3( ','1-2( 8"#%( )*+33',-$,-( %"( +)*$'&'A( $#( %*+%( "7( *"3$#%$)+332( N6'$,-O(
8",$%"1$,-( $,( %*'( *"8'4( 5*'#'( 8"6$3'( %')*,"3"-$'#( 0$33( )""3( +,/( "7%',( 1'#.3%#( $,( 6'$,-( +/8$1'/( +,/( "7%',( /'7'11'/(
8+>'( !'1#",+3$#'/( +,/( +--1'-+%'/( ','1-2( .#+-'( %"( 62( !''1#4( T%( $#( %*$#( 3+%%'1( )+%'-"12( %*+%( 8+1>'%$,-(
$,7"18+%$",( +))'##$63'( $,( 8'+,$,-7.3( 0+2#( %"( ',+63'( )"8!+,$'#( "7%',( #''>( %"( $,73.',)'( +#A( 62( &$1%.'A( !1"/.)%#(
)"8!+1$#",( +,/( )"8!'%$%$",( 6'%0'',( !''1#( %"( 7"#%'1( +,( %*'2( +##")$+%'( 0$%*( 6')"8'( )""3( +,/( +1'( %*',( /'#$1+63'( 62(
+)%$&'( )"88.,$%2( "7( %'',+-'1#( $,%'1'#%'/( $,( 1'/.)$,-( "%*'1#4((
','1-2( .#'4( 5*'( 8"6$3'( /'&$)'#( 0$33( +3#"( 8+>'( +&+$3+63'(
C""3,'##($#(-','1+332(+()*+33',-$,-(!1"!'1%2(%"(/'#$-,($,%"(
#%+%.#( .!/+%'#( +6".%( $,/$&$/.+3( ','1-2( .#'( +,/( !1"&$/'(
+( !1"/.)%( +,/( 0$%*$,( %*'( %*1''( %2!'#( "7( )""3( 0'( *+&'(
%+1-'%'/('/.)+%$",+3(8+%'1$+3(%"(.#'1#4(
$/',%$72(%*'(#')",/(9+##")$+%'/(0$%*(+)%$",#("1(+)%$&$%$'#(%*+%(
5*'( !"!.3+1$%2( "7( *"8'( ','1-2( 8",$%"1#( 71"8( -+$,(1')"-,$%$",(71"8(!''1#?(+#(8"#%(3$>'32(%"(6'(+)*$'&+63'(
8+,.7+)%.1'1#( #.)*( +#( ;3'1%:'( 90004+3'1%8'4)"8?( +,/( 0$%*$,(%*'(!1"U')%4(5*$#(0$33(6'()".!3'/A(%"(+(3'##'1('B%',%A(
C.11',%( C"#%( 90004).11',%)"#%4)"8?A( +,/( #'1&$)'#( #.)*( +#( 0$%*( %*'( 7$1#%( %2!'( 9*+&$,-( /'#$1+63'( %*$,-#?4( 5*'( 8"6$3'(
D""-3'( E"0'1:'%'1( 90004-""-3'4)"8F!"0'18'%'1?( 8'+,( +!!3$)+%$",#( 0'( +1'( /'#$-,$,-( 0$33( ',+63'( %'',( .#'1#( %"(
%*+%( 8",$%"1$,-( '3')%1$)$%2( .#'( $,( %*'( *"8'( $#( $,'B!',#$&'( 8",$%"1( %*'$1( ','1-2( .#+-'( 9)+!%.1'/( .#$,-( 3"0( )"#%(
+,/( .,)"8!3$)+%'/4( ( G"0'&'1A( '&',( 0*'1'( %*'( ','1-2( 8",$%"1$,-(%')*,"3"-2($,(%*'(*"8'(+,/(8"6$3'(/'&$)'#?(+,/(
)",#.8!%$",( $,7"18+%$",( $#( !1"&$/'/A( %*'( &$#.+3$H+%$",( "7( /'&$#'( %*'$1( "0,( 0+2#( "7( 1'!1'#',%$,-A( #*+1$,-( +,/(
%*$#( $,7"18+%$",( "7%',( )+,,"%( '+#$32( )"11'3+%'/( 0$%*( )"8!+1$,-( %*'( $,7"18+%$",4( 5*1".-*( ".1( !+1%$)$!+%"12(
)",#.8!%$",(6'*+&$".1(IJK4(5*$#($#('$%*'1(6')+.#'(%*'(.,$%#( +!!1"+)*( 0'( 0$33( )1'+%'( +!!3$)+%$",#( %*+%( #.!!"1%(
"7( 8'+#.1'8',%( +1'( 1'3+%$&'32( 8'+,$,-3'##( %"( .#'1#( "1( %*'( ).#%"8$#+%$",( +,/( 'B!1'##$&$%2( #.)*( %*+%( %*'2( )+,( 6'(
$,7"18+%$",( $#( $11'3'&+,%( %"( %*'$1( $,%'1'#%#( 9'4-4( )"#%( +!!1"!1$+%'/( $,( +( N)""3O( 0+2#( 62( %'',+-'1#4( V,'( #)',+1$"(
$,7"18+%$",(8+2(,"%(8'+,(8.)*( 7"1(%'',+-'1#(0*"(/"(,"%( 0'( ',&$#+-'( $#( %'',+-'1#( 6'$,-( +63'( %"( )"8!+1'( ','1-2(
!+2( %*'( 6$33#?4( L.1%*'18"1'( %*'1'( $#( +( )"88",( 3+)>( "7( .#+-'(.#$,-(+(8'%1$)(+,/(&$#.+3$H+%$",(%*'2(%*'8#'3&'#(*+&'(
+0+1','##(+6".%(%*'(+8".,%("7(','1-2()",#.8'/(62(/'&$)'( /'&$#'/( +,/F"1( +/"!%'/( 90*$)*( $#( +##.8'/( %"( 6'( )""3( $,(
#$,(%*'(*"8'(+,/(','1-2@#+&$,-("!%$",#(IMK4( %*'$1(!''1(-1".!?(%"(/'%'18$,'(0*"($#(%*'(0$,,'1(9.#$,-(%*'(
3'+#%(','1-2?(+,/(0*"($#(%*'(3"#'1(9.#$,-(%*'(8"#%(','1-2?4(
5*'( >'2( )*+33',-'( "7( %*$#( 0"1>( $#( ,"%( ",32( /'#$-,( *$-*32(
T,(%*$#('B+8!3'($%($#(3$>'32(%*+%()"8!'%$%$",(0$33(',)".1+-'(
.#+63'( 8"6$3'( %')*,"3"-$'#( %"( !1"&$/'( +))'##( %"( ','1-2(
)",#$/'1+%$",( +,/( 1'/.)%$",( "7( ','1-2( .#'4( ;3#"A( %*'#'(
.#+-'( $,7"18+%$",( !1'#',%'/( $,( +( 8'+,$,-7.3( 0+2( 7"1(
8"%$&+%$",#( 0$33( 6'( ,.1%.1'/( +,/( #.!!"1%'/( %*1".-*( .#'( "7(
%'',+-'1#A(6.%(+3#"(%"(',#.1'(%*+%(%*'#'(%')*,"3"-$'#(%*+%(+1'(
%*'( :;<( %')*,"3"-$'#( %*+%( 0$33( !1"&$/'( $,7"18+%$",( +,/(
#.77$)$',%32( N)""3O( %*+%( %*'2( +1'( /'#$1+63'( +,/( #")$+332(
+/&$)'( ",( 8'+#.1'#( %"( 1'/.)'( ','1-2( .#'A( $,( +//$%$",( %"(
+))'!%+63'4( G+&$,-( )1'+%'/( /'&$)'#( %*+%( +1'( .#'/( +,/(
!1"&$/$,-($,7"18+%$",(",().11',%(','1-2(.#+-'4((((
.,/'1#%""/( 62( %*'( %'',#A( 0'( 0$33( %*',( .#'( +( 1+,-'( "7(
+!!1"+)*'#( %"( 3'+/( %"( 3",-@%'18( 6'*+&$".1+3( 8"/$7$)+%$",4( %"&().()$/#"0.*12$$
5"( +)*$'&'( %*'#'( -"+3#( +( !+1%$)$!+%"12( +!!1"+)*( $#( .#'/( 5*$#( 0"1>( 0$33( 6.$3/( .!",( %*'( 55:( 8"/'3( "7( 6'*+&$".1(
0*$)*( $,&"3&'#( 0"1>$,-( /$1')%32( 0$%*( 2".,-( !'"!3'( $,( )*+,-'( IQQK( +,/( 0$33( 3$,>( $,%"( 8"1'( 1')',%( 0"1>( ",(
#)*""3#(%"()+112(".%(/'#$-,(+,/('&+3.+%$",(#%./$'#4(( '8"%$",+3(',-+-'8',%(7"1(6'*+&$".1()*+,-'(9ISKAIWK?(0*$)*(
/'8",#%1+%'#( %*+%( 6'*+&$".1( )*+,-'( $#( 8"1'( '77')%$&'A(
P'( ,"0( /$#).##( %*'( )*+33',-'( "7( N)""3O( +,/( ".1( $,$%$+3( ',-+-$,-( +,/( !1"/.)%$&'( $7( %*'1'( $#( +,( '8"%$",+3(
7$,/$,-#A( %*'( !'1#.+#$&'( +#!')%#( "7( %*'( %')*,"3"-$'#( 0'( +1'( ',-+-'8',%(6'%0'',(%*'(%')*,"3"-2(+,/(%*'(.#'14(5*.#(".1(
)1'+%$,-A(+,/(%*'(%')*,"3"-$)+3()*+33',-'#(0'(7+)'4(P'(-$&'( 8"6$3'( %')*,"3"-$'#( *+&'( %"( #.!!"1%( +!!1"!1$+%$",( $,( )""3(
+,("&'1&$'0("7(1'3+%'/(0"1>(+,/(7$,$#*(0$%*(+(/$#).##$",("7( 0+2#( 6.%( +3#"( *+&'( %"( 6'( /'#$-,'/( $,( +( 0+2( %*+%( %'',+-'1#(
>'2($##.'#(+,/(7.%.1'(0"1>4( )+,('+#$32(1'3+%'(%"(%*'8(+,/($,(+(8+,,'1(%*+%($#(1')'!%$&'(%"(
!"#$%"&''#()#$*+$,%**'-$ '8"%$",+3($,%'1!1'%+%$",(9$4'4(%*'(#2#%'8#(%*'8#'3&'#(/"(,"%(
P*$3'( %*'( 8'+,$,-( "7( N)""3O( *+#( 6'',( )",#$/'1'/A( 7"1( ,')'##+1$32(*+&'(%"(6'('8"%$",+3A(%*'2(U.#%(*+&'(%"(6'(+63'(
'B+8!3'( IQRK( IQSKA( %*'1'( $#( ,"%( +( #$,-3'( .,$&'1#+332( %"( +!!'+1( '8"%$",+3( '&',( $7( %*+%( '77')%( $#( !1"U')%'/( 62( %*'(
+!!3$)+63'( /'7$,$%$",4( C""3( 8+2( 6'( +,%$@#")$+3( "1( $33$)$%A( $%( .#'1?4(
8+2(6'('B!',#$&'(+,/(*$-*32(/'#$1+63'A("1($%(8+2(1'!1'#',%(
5*$#(!1"U')%(0"1>#(71"8(%*'(+##.8!%$",(%*+%(%'',+-'1#(*+&'(
$,,"&+%$",( 9+,/( %*'#'( +1'( ,"%( 8.%.+332( 'B)3.#$&'(
%*'( !"%',%$+3( %"( 8+>'( #$-,$7$)+,%( )*+,-'#( %"( ','1-2( .#+-'4(
)+%'-"1$'#?4( T,( %*'( )+#'( "7( %'',+-'1#A( !''1( -1".!#( "7%',(
X"%(",32()+,()*+,-$,-(%'',+-'(6'*+&$".1(+77')%(%*'$1(3",-@
!"#$%&"#'()*+%,'"-%.,!%!/"0%*#"%*+'(%1)%*%&('1!1()%2/"#"%!/"0% B!/"%),$."#%7"&")71)9%()%!/"%3('!%(6%!/"%7"813"C-%.,!%*6!"#%
3*)%,'"%4&"'!"#%&(2"#5%!(%*66"3!%!/"%*!!1!,7"'%*)7%."/*81(,#'% 1)1!1*+% !#1*+'% 2"% 21'/% !(% (&")% !/"% '0'!"$% ,&% !(% *'% 217"#%
(6% !/"1#% &*#")!'-% '1.+1)9'% *)7% 6#1")7':% ;'% $*)0% !"")*9"#'% &*#!131&*!1()%*'%&(''1.+":%%%
/*8"% *% 9#"*!"#% *$(,)!% (6% +"1',#"% !1$"% !/*)% *7,+!'-% !/1'% 3*)%
?)% (#7"#% !(% ")*.+"% ")"#90% $()1!(#1)9% 1)% !/"% /($"% !/"%
#"',+!%1)%!/"%,'"%(6%$*)0%/19/%")"#90%!"3/)(+(91"'%',3/%*'%
(="3!% 21++% ,'"% +(2% 3('!% XY"% 1!% *8*1+*.+"%
"% (="3!% 21++% *1$% !(% 9*!/"#% $(#"% 1)6(#$*!1()% *.(,!%
(8"#% !/"% ?)!"#)"!:% P")'1)9% >1!'% 21++% ."% (817"7% 6(#% *%
!"")*9"#'5% &*!!"#)'% (6% ")"#90% ,'"% 1)% (#7"#% !(% ,)7"#'!*)7%
),$."#%(6%,'"#%43/*$&1()'5%*)7%1'%/(&"7%!/*!%!/"0%21++%/"+&%
!/"1#% ."/*81(,#'% *)7% $(!18*!1()'% $(#"-% *)7% /(2% !/"0% $*0%
")3(,#*9"% (!/"#% !"")'% !(% &"'!"#% &*#")!'% 1)!(% .,01)9% !/"% >1!%
."%1)6+,")3"7:%
'(%!/"0%3*)%!*>"%&*#!:%%
"% 1)1!1*+% 9(*+% 6(#% ."/*81(,#% 3/*)9"% 1)% !/1'% 2(#>% 1)% !(%
;%&*#!131&*!(#0%7"'19)%(3"''%!(%3#"*!"%D;EF%*)7%D;EG%
1)6+,")3"% #"7,3!1()% 1)% "+"3!#13*+% *)7% !#*)'&(#!% ")"#90% ,'":%
21++% ."% ()9(1)9% 21!/% '"8"#*+% 7166"#")!% 9#(,&'% 1)% !"")*9"#'%
?)1!1*++0-% '!(#1"'% (6% ")"#90% ,'*9"% 21++% ."% 3(++"3!"7% 6#($%
1)%'3/((+'%*3#(''%!/"%QR%1)8(+8"7:%%L"%"@&"3!%!(%7"8"+(&%*%
!"")*9"#'% 1)% !/"% '3/((+'% 21!/% 2/13/% 2"% *#"% 2(#>1)9:% "%
$1@!,#"% (6% "7,3*!1()-% 9*$"I&+*01)9% *)7% 3($&"!1!1()-%
'!(#1"'%21++%."%3($&('"7%(6%!"@!-%1$*9"'-%817"(%(#%*,71(%*)7%
3(++*.(#*!1()-% &""#% "'',#"% *)7% '"+6I*2*#")"''% #*1'1)9%
21++% 918"% A,*+1!*!18"% 1)'19/!'% 1)!(% !"")% ")"#90% ,'"% *)7%
*&(*3/"'% 21!/1)% *)7% *#(,)7% !/"'"% (7,3!'% !(% +"*7% !(%
*!!1!,7"'% !(2*#7'% ")"#90% ,'"% B'($"% 21++% ."% 3(++"3!"7% 1)%
#"7,3!1()%1)%&"#'()*+%")"#90%,'"%1)%!/"%'/(#!%!"#$%*)7%+()9I
'3/((+-% (!/"#'% 21++% ."% 3(++"3!"7% 7,#1)9% 6(3,'% 9#(,&'C:% ;!% *%
!"#$%."/*81(,#*+%3/*)9":%?)%*771!1()%!(%D;EF%*)7%D;EG-%
+*!"#%'!*9"%1)%!/"%(="3!-%*6!"#%2"%/*8"%7"&+(0"7%!/"%D;EF%
*%'&"31*++0%7"'19)"7%2".%&(#!*+%21++%."%,'"7%!/#(,9/(,!%!/"%
*)7% D;EG% (7,3!'-% 2"% 21++% !/")% 3(++"3!% ")"#90% '!(#1"'%
(="3!% !(% *++(2% &*#!131&*)!'% 1)% !/"% (="3!% !(% '/*#"% '!(#1"'%
*9*1)% !(% *++(2% 6(#% A,*+1!*!18"% 3($&*#1'()% (6% 3/*)9"% 1)%
*.(,!%!/"1#%")"#90%,'*9"-%,'1)9%)*##*!18"-%1$*9"'%*)7%817"(:%
."/*81(,#:%%
"'"%21++%(817"%*%#13/%'(,#3"%(6%A,*+1!*!18"%7*!*%6(#%!/"%
!""#$!"%'(')*$$ (="3!%*)7%*+'(%*++(2%!/"%17")!1613*!1()%(6%3/*)9"%1)%")"#90%
"%(="3!%*1$'%!(%3#"*!"%!2(%>"0%$(.1+"%(7,3!'-%()"%6(#% ,'*9"%/*.1!'%*'%!/"%(="3!%(9#"''"':%%%%%
FHIFJ% 0"*#% (+7'% BD;EFC% *)7% *)(!/"#% 6(#% FJIFK% 0"*#% (+7'%
+"(,!"-$.'+/$
BD;EGC:%;%>"0%1'',"%1'%'"+"3!1)9%2/13/%$(.1+"%&+*!6(#$B'C%
;% '$*++% ),$."#% (6% 2"*#*.+"Z$(.1+"% #"'"*#3/% (!(!0&"'%
!(% !*#9"!% *)7% !/1'% 1'% +1>"+0% !(% ."% !/"% !#*7"I(66% 1)% !"#$'% (6%
*)7% (7,3!'% /*8"% ."")% 7"8"+(&"7% 6(#% 3()8"01)9% ")"#90%
6"*!,#"'% (817"7% *)7% 7"813"% &(&,+*#1!0:% L/1+"% '$*#!%
,'*9"% 1)6(#$*!1():% Q.1[#"")% \T]% ,'"7% $(.1+"% &/()"'% *'%
&/()"'% ',3/% *'% M+*3>."##0% 7"813"'-% 1N/()"'-% ;)7#(17%
*$.1")!% 71'&+*0'% !(% 918"% ,'"#% 6""7.*3>% ()% !/"1#%
7"813"'-% *)7% O(>1*% P0$.1*)% /*)7'"!'% *#"% 1)3#"*'1)9+0%
!#*)'&(#!*!1()%."/*81(,#':%?!%#"+1"7%()%!/"%2"*#*.+"%'")'1)9%
"8*+")!% *$()9% *7,+!'% 1)% !/"% QR-% !/"1#% /19/% 3('!% (6!")%
,)1!-%[PD%3"++%'19)*+'%*)7%!/"%&*#!131&*)!'5%$*),*+%1)&,!%!(%
$*>"'% !/"$% 1)*33"''1.+"% !(% 0(,)9"#% !"")*9"#'% 21!/% +1!!+"%
7"!"3!% !#*)'&(#!*!1()% $(7":% ^3(I6#1")7+0% !#*)'&(#!*!1()%
'&")71)9%&(2"#%*)7%#"'!#13!"7%!(%4&*0% *'%0(,%9(5%B3()!#*3!%
."/*81(,#'-%',3/%*'%3*#&((+1)9-%!*>1)9%.,'%*)7%303+1)9%"!3:%
6#""C% 3*++% &+*)':% S#($% (,#% 3,##")!% '!,71"'% 1)% '3/((+'% 21!/%
2"#"% ")3(,#*9"7% *)7% '/(2)% *'% #"2*#7'% ()% !/"% *$.1")!%
0"*#%T'%B*9"%FUIFFC%*)7%0"*#%FU'%B*9"%FHIFVC%1!%1'%*&&*#")!%
71'&+*0:%^)"#90_16"%\H]%1'%*%&"#8*'18"%'")'1)9%*)7%6""7.*3>%
!/*!% !/"% &/()"'% !/"0% (2)% *#"% .*'13% 7"813"'% (6!")% /*)7"7%
'0'!"$:% ;% '"#8"#% 2*'% 3())"3!"7% 21#"+"''+0% 81*% *% .*'"%
7(2)%6#($%*)%(+7"#%'1.+1)9%(#%&*#")!:%L"%/*8"%*+'(%6(,)7%
'!*!1()%!(%")"#90%'")'(#'%2/13/%#"&(#!"7%!/"1#%")"#90%,'*9"%
!/*!% !/"% 3/1+7#")% 1)% (,#% 1)1!1*+% '!,71"'% /*8"% +1!!+"% 1)!"#"'!% 1)%
"8"#0% 3(,&+"% $1),!"':% "% #"*+% !1$"% ")"#90% 3()',$&!1()%
(2)1)9% *)7% ,'1)9% *% $(.1+"% &/()":% M(0'% 1)% &*#!13,+*#%
1)6(#$*!1()% !(9"!/"#% 21!/% 7"813"% 3()',$&!1()% /1'!(#0-%
*7$1!!"7%!/*!%!/"0%6*1+"7%!(%#"$"$."#%!(%3/*#9"%!/"1#%&/()"%
")"#90%#"'"#8*!1()%!1&'%"!3:%2"#"%7"+18"#"7%!(%*%'$*#!%&/()"%
(#%")',#"%!/"0%/*7%")(,9/%3#"71!%!(%$*>"%3*++':%P"8"#*+%0"*#%
,&()%,'"#`'%#"A,"'!%,'1)9%*%X*#(,'"+%1)!"#6*3":%[#17X*#.()%
FU%.(0'%3+*1$"7%!/*!%!/"0%6(,)7%!/"1#%$(.1+"%&/()"%,'"6,+%
1'% *)% 1N/()"% *&&% (7,3"7% !/#(,9/% !/"% 1E^*P% N#(="3!%
*'%*)%*+*#$%3+(3>%.,!%+1!!+"%"+'":%%
B222:17"*'(="3!:1)6(C% 2/13/% '/(2'% !/"% 3,##")!% 3*#.()%
<"3/)(+(91"'% *7(&!"7% .0% (+7"#% !"")*9"#'% BFTIFKC% 21!/% 1)!")'1!0-% !/"% A,*)!1!0% (6% XYG% (7,3"7% 6(#% F% >L/% (6%
'+19/!+0%/19/%'&")71)9%&(2"#%*#"%(6!")%6*'/1()%+"7-%.,!%)(!% "+"3!#131!0% 3()',$"7-% (6% !/"% "+"3!#131!0% 3,##")!+0% ."1)9%
)"3"''*#1+0%!/('"%2/13/%/1!%!/"%$*1)'!#"*$%(#%*7,+!%$"71*:% 9")"#*!"7%1)%!/"%QR:%"%1)!")!1()%(6%!/"%*&&%1'%!/*!%1!%3*)%
S(#%"@*$&+"-%1)%*%',#8"0%(6%*++%)"2%,)7"#9#*7,*!"%")!#*)!'% ."% ,'"7% *'% *% !((+% !(% 1)6+,")3"% ")"#90% 7"$*)7% *)7% #"7,3"%
!(%*%$*=(#%QR%Q)18"#'1!0-%M+*3>."##0%7"813"'%(,!),$."#"7% XYG% "$1''1()':% ;+"#!D"% (817"% *)% 1N/()"% *&&% !(% *++(2%
.(!/%O(>1*5'%*)7%1N/()"'-%6(#%"@*$&+":%1'%1'%&*#!+0%7,"%!(% #"$(!"% *33"''% !(% 7*!*% #"3(#7"7% .0% !/"1#% /($"% ")"#90%
!/"%3('!%(6%',3/%7"813"'%.,!%*+'(%!/"%*8*1+*.1+1!0%(6%'&"31613% $()1!(#1)9%(7,3!:%"%*&&%*++(2'%3,##")!%")"#90%,'*9"%!(%
3($$,)13*!1()% 3/*))"+'% W% M+*3>."##0% D"''")9"#% ."1)9% *% ."%81"2"7%#"$(!"+0%*)7%(817"'%*%4&"#'()*+%'21)9($"!"#5%
&(&,+*#% ()"-% .,!% )(!% B"*'1+0C% *33"''1.+"% 21!/(,!% *% 2/13/% 1'% *% '1$&+"% 9#*&/13*+% #""'")!*!1()% !(% /"+&% 3()8"0%
M+*3>."##0% /*)7'"!:% L1!/1)% !/"% (="3!% 2"% /*8"% 6,)7'% !(% ")"#90% ,'*9"% 1)% *)% "*'1+0% ,)7"#'!*)7*.+"% $*))"#:% L/1+"%
(817"%*%'$*++%),$."#%(6%&*#!131&*)!'%21!/%$(.1+"%7"813"'% !/"'"% "@*$&+"'% /19/+19/!% '($"% 1))(8*!18"% *&(*3/"'% !(%
!"#$%&'() "'"!(*) $+") ,-.$(-) /.0&1") ,"%-'.1.(&"+) '.'") .2) @eB) Q!""#>) Q7) 3'#) T"31">) P7>) M'(3(&'() MC<"!&"'%"+) 4&,-)
,-"/) 31&(') 4&,-) ,-") /.!") -.1&+,&%) 3'#) 1.'(5,"!/) "'"!(*) M/.,&.'31) f&!,$31) =-"!3<&+,+7) &') 8',"!'3,&.'31) H"+&(')
!"#$%,&.')3&/+).2),-&+)4.!67)) 3'#)M'(3(30&1&,*)Q.'2"!"'%")g)U.!#&QE8>)?+1.>)JVVW7)
!"#$%##"&'( @]B) H"<3!,/"',) .2) M'"!(*) h) Q1&/3,") Q-3'(") RJVVZS)
8')%!"3,&'()"'"!(*)+39&'()#"9&%"+)2.!),""'3("!+)4")%.'+"!) M'"!(*)Q.'+$/<,&.')&'),-")c'&,"#)i&'(#./7)P",!&"9"#)
,-3,) :%..1;) &+) 3) <.4"!2$1) 23%,.!) &') /.,&93,&'() 3#.<,&.') 3'#) 2!./)
3<) 4") '""#) -,,) <"!+.'31) (.31) 3,&.'+Y"%$6)Y"%$673+) 3'#) /36") (..#) $+") .2) "'"!(*) 3') @WB) [3/"+) N&"!%">) H&3'") [7) O%-&3'.>) 3'#) M!&%) N3$1.+>)
&',"(!31) <3!,) .2) ,-") ("'"!31) #&+%.$!+") 0",4""') ,""'+7) ?$!) aE./">) -30&,+>) 3'#) "'"!(*X) "C3/&'&'() #./"+,&%)
3<) &',"!3%,&.'+) 3'#) "'"!(*) %.'+$/<,&.'>b) &') QE8dIVX)
0$,) ,.) %!"3,") ,"%-'.1.(&"+) ,-3,) %3') 0") <"!+.'31&+"#) 3'#) N!.%""#&'(+) .2) ,-") JA,-) &',"!'3,&.'31) %.'2"!"'%") .')
3<) U"4) j.!6>) Uj>)
=-") ",-&%+) .2) <"!+$3+&.') @AB) &') ,-") %.',"C,) .2) ,-&+) )<<7)IZA]5IZZe>)GQF>)JVIV7)
3!")+./"4-3,)/&,&(3,"#)&'),-3,),-")!"#$%,&.').2)"'"!(*)$+") @\B) [.') k!."-1&%->) =343''3) H&113-$',>) N!"#!3() i13+'D3>)
&+) 3%%"<,"#) ,.) 0") 3) '"%"++3!*) /.9"7) E.4"9"!>) ,-&+) 4&11) 0") ["''&2"!) F3'6.>) O$''*) Q.'+.19.>) T"9"!1*) E3!!&+.'>)
3') 3!"3) 4") "C<1.!") &') #",3&1) 3+) ,-") #"9"1."',) .2) ,-") 3'#)[3/"+)G7)`3'#3*>)ac0&(!""'X)&'9"+,&(3,&'()3)/.0&1")
FGHI) 3'#) FGHJ) b) &') N!.%""#&'(+) .2) ,-") J\,-) &',"!'3,&.'31)
"C<1.!") &'&,&31) +%"'3!&.+) 3'#) !"K$&!"/"',+) 2.!) FGHI) 3'#) %.'2"!"'%") .') E$/3') 23%,.!+) &') %./<$,&'() +*+,"/+>)
2$!,-"!) $'#"!+,3'#) ,-") 6"*) %-3!3%,"!&+,&%+) .2) %..1) 2.!) U"4) j.!6>) Uj>) cOG>) QE8) dVZ>) <<7IVe^5IV]J>) GQF>)
#&22"!"',) (!.$<+7) 8') <3!311"1) 4") 3!") 31+.) "C<1.!&'() 3'#) JVVZ7)
,"%-'&%31) <.++&0&1&,&"+) 3'#) "C<"!,) ,"%-'&%31) #"+&('+>) 3'#)
@AB) H3'&"1) T"!#&%-"9+6*) 3'#) M!&6) U"$"'+%-43'#"!7) IZZZ7)
&'9"+,&(3,&'() ,""'3("!+;) %$!!"',) 3,,&,$#"+) ,.43!#+) "'"!(*)
=.43!#) 3') ",-&%+) .2) <"!+$3+&9") ,"%-'.1.(*7) Q.//$'7)
$+"7)L")-.<"),-3,),-")'.9"1),-"/"+)&'),-&+)4.!6)4&11)0").2)
GQF)eJ>)])RF3*S>)]I5]A>)IZZZ7))
&',"!"+,) ,.) ,-") <3!,&%&<3',+) .2) ,-") 4.!6+-.<) 3'#) ) H39) =!3'>) 3'#) P"0"%%3) M7) _!&',"!>)
a_",,&'() ,.) (!""'X) $'#"!+,3'#&'() !"+.$!%") %.'+$/<,&.')
)$*'&+,-!./-'0#( &') ,-") -./">b) &') N!.%""#&'(+) .2) ,-") IV,-) &',"!'3,&.'31)
L") 4.$1#) 1&6") ,.) ,-3'6) MNOPQ) R$'#"!) ,-") H&(&,31) %.'2"!"'%") .') c0&K$&,.$+) %./<$,&'(>) U"4) j.!6>) Uj>)
M%.'./*)3'#)M'"!(*)N!.(!3//"S)2.!)2$'#&'(),-&+)4.!67)))! cOG>))c0&Q./<)dVA>)<<7)JeJ5J]I>)GQF>)JVVA7)
1-2-1-'$-#( @IVB) ?dH.''"11>) i7G7) 3'#) H7`7) L3!#1.4>) G) ,-".!*) .2) ,-")
@IB) TTQ) U"4+) RJVVWS) =""'3("!+) 3!") :+,3'#0*) 9&113&'+;7) .!&(&'+) .2) %..1'"++>) G#93'%"+) &') Q.'+$/"!) P"+"3!%->)
P",!&"9"#) 2!./) J\>))<3("+7)I^)5)IA>)JVVV7)
-,,) [7?7>) U.!%!.++>) [7Q7) 3'#) H&%1"/"',">) Q7Q7)
Q-3'(&'()k.!)_..#7)G9.')T..6+>)U"4)j.!6>)IZZe7)
@JB) T"31">) P7) 3'#) Q!""#>) Q7) G22"%,&9") 8',"!3%,&.'X) E.4)
"/.,&.'31) 3("',+) 322"%,) $+"!+7) 8',"!'3,&.'31) [.$!'31) .2) @IJB) =3<<>) G7) 3'#) O7) T&!#>) O.%&31) /3!6",&'() 3'#) ,-")
E$/3'5Q./<$,"!)O,$#&"+>)W\)RZS7)\]]5\\W>)JVVZ7) /"3'&'() .2) %..1>) O.%&31) F3!6",&'() l$3!,"!1*>) Ie>) I)
<3("+7)IA)5)JZ>)JVVA7)
@^B))Q-!&+,."!) G7) TD.!6+6.(>) _&$1&.) [3%$%%&>) `$%&3'.)
_3/0"!&'&>) =3,$) U&"/&'"'>=.<&) F&66.13>) Q3!&') @I^B)=-")O1""<)Q.$'%&1)RJVV\S)[$'6)O1"") 3'#) F3++&/.) T"!,.'%&'&>) aM'"!(*1&2"X) =-!"3,) ,.) =""'3("!+7) P",!&"9"#) 2!./)
<"!93+&9") "'"!(*) 343!"'"++) 2.!) -.$+"-.1#+>b) &') -,,) c0&%./<) dIV>) JVIIS7)
<<7)^WI5^WJ>)JVIV7)
)
)
)
)
)
)
Nudging People at Work and Other Third-Party Locations
Max L. Wilson1, Derek Foster2, Shaun Lawson2, Simon Eddison1
1
Future Interaction Technology Lab Lincoln Social Computing Research Centre
College of Science School of Computer Science
Swansea University, UK University of Lincoln, UK
m.l.wilson@swansea.ac.uk, simon.d.eddison@gmail.com {defoster,slawson}@lincoln.ac.uk
ABSTRACT A recent report [1] has indicated that if the 17 million UK
Nudging people towards positive behaviour change is an workers, who regularly use a desktop PC, powered it off at
important issue recognised by academia, individuals, and night this would reduce CO2 emissions by 1.3 million tons
even governments. Although much research has been - the equivalent of removing 245,000 cars from the road.
published in this area, little has focused on non-domestic Similarly, if a UK business with 10,000 computers leaves
environments such as the workplace. It is widely reported them on all night for one year, it will cost £168,000
that changing individual behaviour of employees can make ($220,000) and emit 828 tonnes of CO2. The same report,
a significant contribution to sustainable resource however, suggested that at least three in ten workers in the
consumption. This position paper focuses on the unique UK do not always power off their PC overnight. Further,
aspects that make nudging consumption behaviour in third- many more machines are in use or provide services 24
party environments like the workplace a very different hours a day, all year round.
problem to that of nudging in people’s domestic and private
lives. Several studies are discussed to provide context as As an example in our own context, Figure 1 compares the
well as evidence towards our position. electricity usage at the University of Lincoln campus for the
first week in December in 2009 and 2010. There are two
Author Keywords compelling features of Figure 1 that characterise the typical
Persuasion, Nudge, Work, Ownership, Sustainability, energy consumption of a workplace. First, the graph clearly
Behaviour Change. shows how little energy the university uses at the weekend.
Second, this period in 2010 coincided with severe weather
ACM Classification Keywords that meant that many staff members were unable to travel to
H5.m. Information interfaces and presentation (e.g., HCI): the campus. The dramatic reduction in energy consumption
Miscellaneous. can be clearly seen in the first 3 days of the graph and
highlights that people can have a significant impact on
General Terms consumption at work, as well as in their own personal
Theory, Human Factors, Design. environments.
INTRODUCTION
The HCI community has recently shown a great deal of
interest in the development of interactive systems that
facilitate behaviour change for sustainability. Much of this
research has exploited ideas recently re-popularised by
Thaler and Sunstein [10] in that individuals can be ‘nudged’
to make better lifestyle decisions, given the right
information and the environment in which to do so. Much
of this work has focused on how individuals might improve
their own private and domestic lifestyle, behaviour, and
sustainable resource consumption; however such work has
Figure 1 Campus electricity usage December 2009/10
rarely taken account of the fact that people spend a
significant amount of their waking hours at work where Despite environmental concerns now playing an established
they also contribute towards resource consumption. role in the public sector, as well as the corporate and
business agenda, there is still much to gain by exploring
new ways of persuading people to adopt positive energy
usage behaviour. The first and obvious research question is:
Copyright © 2011 for the individual papers by the papers' authors. Do domestic PINC (Persuasion, Influence, Nudge &
Copying permitted only for private and academic purposes. This volume is Coercion) methods simply translate to workplace and other
published and copyrighted by the editors of PINC2011.
third-party environments? In this position statement we
review initial evidence that they do not, and discuss the environmentally friendly is, as Stebbins called it, a Serious
reasons why. We propose a framework for thinking about Leisure, where people work hard at achieving their goals.
Nudge methods in different contexts, and discuss our future Installing home technology is often a temporary project,
work in this area. and can be seen as Project Leisure, where people take
behaviour change to be a new task. The aim of much
RELATED WORK nudging research, however, is to be embedded in people’s
Thaler and Sunstein [10] have recently re-popularised the Casual Leisure, so that good consumption is encouraged
interest in the idea of Nudge, where the right environments simply and unobtrusively within our lives. These forms of
and the right information delivered at the right time can leisure, however, are very different from our work lives,
encourage people to adapt and improve their behaviours. which are goal-oriented, formalised, and externally driven.
Much research has focused on directly improving one’s
own behaviour, whether it be reminders to exercise, or to EARLY EXPERIMENTAL FINDINGS
notably reduce energy consumption. Research into simple
Study 1 – Water Consumption in the Work Place
home energy monitors [3], for example, suggests that pay- One early finding in this space was from Kuznetsov and
as-you-go meters typically reduce consumption by only 3%, Paulos [7] who anecdotally saw unexpected results in a
while those that focus on reducing their payments often work environment, and so proceeded to focus on domestic
reduce their consumption by 0-10%. Having an in-house scenarios. Their anecdotal findings saw consumption
monitor that provides instant feedback has been shown to increase – double in fact.
reduce consumption by between 5 and 15%. Other
prototype systems, such as Kuznetsov and Paulos’s One of our recent studies in Swansea University, UK,
domestic ambient light display [7] successfully encouraged focused directly on this surprising issue. We created a series
people to reduce their water consumption, by visualising of feedback installations, and installed them in a shared
better or worse consumption to their previous average use. work-place kitchen. Like the work by Kuznetsov and
Paulos, the installations used a Phidget microphone to track
Other research typically provides anonymous averages from water flow through the pipes. The installations were
a group or community to a user, so that the user can see supported by informational posters, which included a link
their own behaviour or consumption in the context of to a website to provide feedback. Otherwise, we remained
others. In previous work [5], we reduced domestic energy as un-intrusive as possible in order to record normal usage
consumption through a carefully designed mixture of online as closely as possible. After recording baseline average
social media and home energy monitors. Our findings readings, we first recreated the ambient light display
suggested that the use of energy feedback delivered in a provided used by Kuznetsov and Paulos, which: glowed
social context significantly reduced consumption when green with less-than-average consumption; glowed yellow
compared to energy feedback without a social context. We 10% either side of the mean; and glowed red thereafter.
have also shown similar results in a personal fitness/activity
domain [4].
A related approach involves facilitating ‘friendly’
competitive behaviour; for instance it has already been
shown that the work environment affords powerful
opportunities for facilitating such behaviour – for instance
Siero et al [8] demonstrated that when a group of
employees received information not only about their own
energy usage, but also about that of a ‘competing’ group of
employees from the same company but a different
workplace, they significantly altered their energy usage
behaviour compared to a situation in which they only Figure 2: Our ambient-light installation
received information about their own usage.
Three further displays were installed in subsequent weeks.
Despite the success of the work by Siero et al some thirteen The first used similar measures, in respect to average
years ago, little research since has explored energy consumption, to create competitive gaming-style text-
behaviour interventions based on competition between oriented messages on an LED display, such as: “You’re
employees. Therefore, a key question for Nudge researchers beating most people” and “Sorry, you lost”. The second
going forward is how do differences between the work and display converted the light system into a series of audible
domestic leisurely sides of life affect the potential of beeps. The final display tried a different tack altogether, by
behaviour change interventions? Also, what theoretical simply providing environmental information relating to
grounding can we draw upon to begin to explore any their water consumption, such as the average amount of
differences? Stebbins [9] introduced a seminal framework water available to people in the third world on a daily basis.
for understanding people’s leisure time. For some, being
Initially, as per the prior anecdotal evidence, the ambient To mitigate the absence of financial motivation in
light display did double the average consumption of water employees and to develop workplace energy metaphors, we
during the 2 weeks it was displayed. In comparing studying intend to run a series of focus groups and participatory
the additional displays, we saw all but the audio condition design workshops to engage and empower the employee in
increase the consumption. While the increase shown by developing an understanding of both the economic and
these alternatives was significantly less than the ambient environmental impact of their working practices. The
light display in particular, none were significant. Although participatory design workshops will provide an opportunity
the audio feedback did marginally reduce consumption, we for employees to be directly involved in designing the UX
also recorded a significant number of opt-out button presses element of Electro-Magnates therefore helping to address
in the audio condition, indicating that people disliked this ethical concerns over privacy and appropriate disclosure of
particular installation. Qualitative comments from an energy data.
optional online survey confirmed this. Given the surprising
Early work to date includes prototyping a high-impact
increase created by the ambient light display, we concluded
energy interface for overall energy usage in Figure 3, page
the study by reinstalling the ambient light display for a final
viewed on 09/01/2011, as well as a competitive league table
week. Although not quite double the average consumption,
for buildings. Both prototypes are designed for large
we again saw a significant increase in energy consumption.
situated displays and are abstracted presentations of what is
In the end, none of the displays managed to significantly possible with raw energy sensor data which in itself is
decrease consumption of water. It is promising, however, intangible and difficult to interpret.
that not all the displays increased consumption
significantly. This means that such displays do not simply
have the opposite effect in work environments. Instead, the
results suggest that people simply do not care for the
consumption of the company as a whole, and potentially do
not mind entertaining themselves with the resources of the
company by using additional resources. The fact that
significantly more users opted out of the audio display,
which was the only one to reduce average consumption,
further indicates that people do not mind avoiding resources
in this area; that they do not feel personally motivated to
accept the nudging technology.
Study 2 – Energy Consumption in the Work Place
Our recently commenced Electro-Magnates study [6] aims
to reduce energy usage in the workplace by utilising a suite
of social persuasive applications to encourage pro-
environmental behaviours. Personal desktop applications
(social widgets) and situated displays will be used to deliver
energy feedback to individuals, groups and communities Figure 3 High-impact visualisation of overall energy usage
about their own – and others’ – energy usage to foster
exchange of performance and to support constructive DISCUSSION
competition to reduce consumption. The workplace in the The workplace, as an example of a non-domestic, non-
context of this study is educational and public sector work- personal environment, creates many unique issues for the
place environments in the county of Lincolnshire, UK. ideas behind nudging behaviour. Consequently, we have
identified three initial dimensions that differentiate
In previous work [5], we reduced domestic energy domestic and workplace environments that might be used as
consumption through social norms and social technology. a formative framework for thinking about applying nudging
However, designing a similar system for the workplace technology in different environments:-
presents greater challenges across a range of design, ethical
and technical issues. From our study focus groups in the Expression of Self. First, the workplace may be termed a
domestic environment we discovered that for some people special environment in that there are usually constraints and
cost was the primary motivating reason to reduce their rules in how employees can interact and carry out activities
energy use. In the workplace employees are not typically in the workplace compared to their less inhibited personal
responsible for paying energy costs, neither are they life. This is particularly important when considering
directly responsible for meeting any governmental carbon employee consumption of resources with emphasis on
policies in place that could lead to institutional ‘carbon’ ownership, freedom of choice and sustainable behaviour.
fines. Ironically, an individual may be committed to pro-
environmental behaviour when at home but is forced to
engage in negative practices at work such as using ACKNOWLEDGMENTS
inefficient energy-intensive equipment or sitting in an over- We’d like to thank the NIMD2010 participants for
heated environment. discussions. The Electro-Magnates project is funded by the
HEFCE LGM fund.
Sense of Responsibility. Second, prior research typically
assumes that individuals are trying to change their REFERENCES
behaviour, or reduce their consumption, but for many the [1] 1E PC Energy Report 2009. online at
workplace is not their own and not their responsibility. http://www.1e.com/Energycampaign/Index.aspx
Consequently, not only is the environment and technology
controlled for them, people have a diminished sense of [2] Arroyo, E., Bonanni, L. and Selker T., Waterbot:
responsibility for the energy costs and environmental Exploring Feedback and Persuasive Techniques at the sink,
impact. In Proc CHI 2005, ACM Press(2005)
[3] Darby, S. The Effectiveness of Feedback on Energy
External Constraints. Third, the workplace or type of work
Consumption. Enironmental Change Institute, The
has its own requirements – they may need to maintain 24-7-
University of Oxford, 2006.
365 server support. It may be normal for some businesses to
have 3 or more machines running per individual, but [4] Foster, D., Linehan, C., Lawson, S., and Kirman, B.
unusual for others to have a computer at all. This kind of Motivating physical activity at work: using persuasive
top-down requirement might make individuals feel out of social media for competitive step counting. In Proc.
control of the environment and its consumption, leading to Mindtrek 2010, ACM Press(2010)
lack of motivation. [5] Foster, D., Lawson, S., Blythe, M., and Cairns, P.
Given these limiting and influential factors, it is hard to Wattsup?: Motivating reductions in domestic energy
consider how we can utilise the same nudging technology consumption using social networks. In Proc. NordiCHI
that we typically apply in domestic contexts. The few 2010.ACM Press(2010)
successful workplace nudging installations have typically [6] HEFCE 2010. online at
been dependent on a driven community. The CleanSink http://www.hefce.ac.uk/lgm/build/lgmfund/projects/show.as
project [2] saw some positive influence in hospitals, where p?id=195&cat=15
cleanliness is both required and important for care. Our on- [7] Kuznetsov, S. and Paulos, E. UpStream: Motivating
going study on energy consumption in Lincoln, is focusing Water Conservation with Low-Cost Water Flow Sensing
on driving community motivation, which may encourage and Persuasive Displays. In Proc. CHI 2010, ACM Press
expression of self and increase sense of ownership, whilst (2010).
working within the external constraints of the workplace.
[8] Siero, F.W., A.B. Bakker, G.B. Dekker, and M.T.C. van
CONCLUSIONS AND FUTURE WORK den Burg. . Changing organizational energy consumption
Much of the prior research on Nudge, and other PINC behavior through comparative feedback. In Journal of
issues, has assumed that individuals are focusing on their Environmental Psychology 16: 235-246. (1996)
environments, behaviours, consumption, and other things [9] Stebbins R. (2007) Serious Leisure: A Perspective For
that they are in some control over. How does Nudge fare in Our Time. Transaction: New Brunswick.
environments, like the workplace, that are typically outside
[10] Thaler, R and Sunstein, C. (2008) Nudge: Improving
of an individual’s control? Such questions are important for
Decisions About Health, Wealth, and Happiness: Yale
larger organisations who want to improve their collective
University Press.
behaviour, whether it is a business trying to reduce its own
consumption or meet it’s quota of carbon credits, or a
government trying to reduce the nation’s consumption.
In our future work, we are focusing on this issue in two
ways. First, our funded research is focusing further on
encouraging community-driven nudges for reducing
business and employee consumption. Second, we are
planning future studies that specifically investigate the
nudge of groups and communities rather than of
individuals, as to meet the UN’s Millennium Goals1, we
need to nudge the behaviour of the global community and
not just that of individuals.
1
http://www.un.org/millenniumgoals/