Sign In

Communications of the ACM

Communications of the ACM

The Landscape of Persuasive Technologies


View as: Print Mobile App ACM Digital Library Full Text (PDF) Share: Send by email Share on reddit Share on StumbleUpon Share on Hacker News Share on Tweeter Share on Facebook

For better or for worse, persuasive technologies are already part of the everyday technological landscape we all live in. Since 1997, the Persuasive Technology Lab at Stanford University has tracked existing and emerging computing devices designed to change human attitudes and behaviors. As a result, we have identified about 50 such devices. The point here, however, is not to list them; instead, we want to offer the deeper insight we've developed by categorizing the landscape of persuasive technologies along four distinct axesdomains, users, form factors, and strategiesfor delivering their messages of change. Not only is this insight important in understanding what's available now, it helps suggest what to expect in the future.

While computers have long used motivational strategies (such as fantasy, competition, and positive reinforcement in educational software [2]), the emergence of persuasive technology artifacts is a significantand potentially controversialnew direction in the design of computing systems. This area is important area for computer professionals to understand so we can influence this new type of technology in a positive way. To this end, we share our views of the domains, target users, form factors, and key strategies of today's persuasive technologies. And to explore the landscape of persuasive technologies, we have selected five artifacts as representative examples (see Table 1 and the sidebar Commercial Applications).

Back to Top

A Dozen Domains

At first glance, you might expect persuasive technologies to be just those that help sell products. But selling is only one region of the persuasive technology landscapeand the least interesting to view. There are at least 12 domains for which persuasive technologies have significant potential (see www.captology.org). We discuss the four that are the most significant today.

The most widely used is marketing, which includes technologies that promote the buying of products and services or increase mindshare for corporate brands. To be sure, the growth of e-commerce and branding on the Web has been explosive and will continue to grow, making buying and branding the main domain of persuasive technologies for the foreseeable future. However, these persuasive artifacts are generally Web sites or elements of Web sites; the strategies they use are largely variations on themes that have worked for decades in the consumer world.

An interesting exception in this domain is Onsale.com, one of our representative examples, a Web site extending far beyond traditional media to leverage the opportunities of an interactive experience. Onsale.com is a virtual auction space allowing people to competitively bid on items in real time (see www.onsale.com). (Because other articles have addressed online marketing [4], we felt it unnecessary to address buying and branding technologies in detail here.)

Health is the next most significant domain for today's persuasive technologies, embracing technologies that motivate people to stay physically fit, take preventive measures against illness, and manage diseases effectively. The pervasiveness of health maintenance through technology isn't surprising; most people accept the idea that improving physical and mental well-being is a good thing to do. As a result, persuasive technologies promoting wellness benefit from a large and enthusiastic potential market and are unlikely to raise serious ethical questions (see Berdichevsky et al.'s "Toward an Ethics of Persuasive Technology" in this issue). Furthermore, in Western cultures, technology has long been valued for helping maintain and recover health. Adding computing devices that persuade to this tradition of technology is a small step, not a revolution.

Two of the representative examples in Table 1 concern health. The 5-A-Day Adventures, a CD-ROM produced by Dole Food Corp., uses animated characters, music, and games to encourage children to eat the number of daily servings of fruits and vegetables recommended by the U.S. Food and Drug Administration. While avoiding the outright promotion of the Dole brand, it effectively promotes better eating habits, an outcome most parents and teachers find attractive, and has been distributed widely in schools throughout the U.S. (see www.dole5aday.com).

Another example in the health domain is Baby Think It Over, a computerized doll used mostly in U.S. high school parenting classes [5]. This technology gives students a painfully realistic simulation of parenting. The "baby" is programmed to cry at random intervals during the day and night; only a key attached to the student "parent's" wrist, when held into the baby for 5 to 15 minutes, will quiet it. A small computer inside Baby Think It Over logs neglectful inattention to cries or other mistreatment of the baby for later analysis by a teacher (see www.btio.com). Like the 5-A-Day Adventures product, Baby Think It Over promotes widely held views, in the Western world at least, of good health behavior.

Our tracking of other health-related persuasive technologies found a similar pattern. These technologies tend to address a significant health issue for which society holds a nearly homogeneous view. We have identified technologies that persuade people to quit smoking, manage diabetes better, exercise more effectively, and more. What we have yet to see are persuasive technologies that promote controversial health behaviors, such as refusing blood transfusions. Undoubtedly, such technologies will appear when the costs of developing, manufacturing, and distributing them are reduced. But before this happens, we will continue to see a wide array of technologies addressing common, noncontroversial health behaviors.

After health, safety is the next most significant domain for persuasive technologies. As in promoting health, promoting safety and security has widespread appeal; for example, few people would find fault with a technology that seeks to persuade drivers to reduce their speed (see www.kustomsignals.com). However, unlike health, safety often hinges on collective behavior, and so can lead to disputes about related ethical issues.


The strategies they use are largely variations on themes that have worked for decades in the consumer world.


Hygiene Guard is a representative technology for motivating safety behavior installed in restaurant and hospital employee restrooms to monitor workers' hand-washing behavior. Each employee is assigned a badge; during any trip to the bathroom, the employee has to use the sink for a set minimum period (timed by how long the water runs); failure to do so is recorded by a central server. The overseer role of Hygiene Guard is more adversarial than many persuasive technologies (see www.hygieneguard.com). Although some people concerned about privacy would object to such technology, others would suggest the outcomes it promotesconsumer safety and preventing the spread of diseasejustify the means.

As for the future of persuasive technologies, another domainenvironmental conservationalso has significant potential. Although few technologies motivate people to preserve, conserve, or restore the natural environment, this is an important domain because, like health and safety, environmentally friendly behavior is widely accepted as desirable.

Among the many opportunities for developing persuasive technologies in this domain is the Scorecard.org Web site, which is designed to motivate environmentally friendly behavior. Sponsored by the Environmental Defense Fund, an advocacy group promoting environmental protection, Scorecard.org provides information on community pollution at a local level; it also suggests actions users can take to address pollution problems, then facilitates taking them (such as sending template faxes to polluting companies).

The Internet has given ecological activism new life, and Scorecard.org is a natural extension of traditional community outreach efforts. Whereas before the Internet became a form of mass communication when a local ecology group might have distributed fliers about polluters in a particular neighborhood, Scorecard.org makes use of data from the U.S. Environmental Protection Agency to give the same sort of information on any community in the U.S. Because few companies champion environmental efforts in the interests of boosting revenue and earning profits, some environmentalists view the Web as a key solution for propagating information and motivating more ecologically minded attitudes and behaviors.

Back to Top

User Age and Status

When considering the users of persuasive technologies, we notice two interesting and important trends involving age and socioeconomic status. According to an ongoing survey by the Persuasive Technology Lab, most existing persuasive technologies are aimed at teen and preteen children. This finding may seem surprising, but considering that most cultures are comfortable shaping the attitudes and behaviors of their younger members, it seems inevitable that the early examples of persuasive technologies would be geared toward children, not adults. Of our five representative artifacts, two are designed for childrenBaby Think It Over and 5-A-Day Adventures. Both are deployed in school settings, implemented as tools of education, not persuasion. In this setting, minors do not elect to use them; they are part of the school curriculum. Far fewer persuasive technologies are designed for adults. Those in use today divide into two categoriesthose imposed on adults and those adults choose for themselves.

Like most persuasive technologies for children, those for adults can be imposed on their users. Hygiene Guard, the hand-washing monitoring system, is an example; employees don't choose to use this system, but have to use it as part of their work activities.

There are also examples of persuasive technologies adults choose for themselves. From our set of representative technologies, two are used voluntarilyOnsale.com and Scorecard.orgby adults who choose to use them, accepting as incidental the persuasive intent of their designers (see Tseng et al.'s "Credibility and Computing Technology" in this issue.

Although one might expect to find many persuasive technologies geared toward self-help issues, like how to break bad habits, remarkably few existing technologies fall into this category. One, however, is a handheld technology designed to help adults quit smoking. Although self-help technologies are not widespread in today's technology landscape, we expect they will become more commonperhaps even pervasive.


A question that still needs an answer, at least in our minds, is whether surveillance is a type of coercion.


Overall, we see a trend in terms of age and these technologies. The early examples (those on the market today) are geared toward the young. But more and more, persuasive technologieselective and nonelectivewill likely be aimed at changing the attitudes and behaviors of adults.

The second trend we see among users of persuasive technologies is socioeconomic status; people or institutions with greater financial resources are most often those that can adopt or impose persuasive technologies. As a result, their users tend to be either those with significant personal resources or those affiliated with institutions with significant resources. For example, the 5-A-Day Adventures CD-ROM requires a multimedia computer to run it. Equipping a high school class with a set of Baby Think It Over devices also involves a significant financial investment. Installing Hygiene Guard requires a similar up-front commitment.

Although today's persuasive technologies are generally designed more for kids than adults, control of persuasive technologies belongs to those with significant financial resources. Both of these generalizations will be less true in the future.

Back to Top

Physical Manifestations

Like the users of persuasive technologies, the form factors, or physical manifestations, of persuasive technologies are varied and changing. They fall into three general categoriesdesktop-based systems, artifact-based systems, and environment-based systems. The most common form todayespecially when factoring in the Web's persuasive applicationsis one accessible through traditional personal computers. From our list of representative examples, 5-A-Day Adventures, Onsale.com, and Scorecard.org all fall into this category. These and many other persuasive technologies are effectively desk-bound, thus limiting where and when persuasion can occur.

In contrast, artifact-based persuasive technologies are often portable and can persuade in many locations. For example, the form factor of Baby Think It Over is essential to the effectiveness of the persuasion. The device is shaped like and weighs as much as a real, flesh-and-blood infant. And its head is weighted to require support when it is held. When the "baby" cries, there is no externally accessible volume control, just as in a real baby. Users have to hold a spring-loaded key in place for an unknown length of time to silence it. The effectiveness of the persuasion lies in the similarity between the Baby Think It Over experience and that of being responsible for a real child. Clearly, this product would not be nearly as effective as a piece of desktop software.

Hygiene Guard is typical of a third type of form factorenvironment-based technology. Such technologies are built into rooms or other spaces; as such, Hygiene Guard is not deskbound, nor does the user carry it, except for its identification badges. Instead, it is integrated into the usage environment. One key value comes from modifying behavior within that environmentin this case, hand washing in the bathroom. Integration of the persuasive technology with the environmenthaving it built into the bathroom, for instancerepresents a higher cost barrier to using such a system. It must be installed, maintained, perhaps even made tamperproof.

Although many new persuasive technologies are likely to emerge in the near future, we expect to see a growing percentage of them built into ordinary objects and environments.

Back to Top

Persuasive Strategies

How do these technologies change our attitudes and behaviors? Our analysis of persuasive technologies has found that the influence tactics they use are not new. Without exception, the motivational and persuasion strategies in persuasive technologies are adaptations of basic strategies people have been using since long before computers were around. For example, positive feedback (giving compliments or encouragement) is a well-known persuasion strategy computers can now leverage [1].

Although computers have not introduced new strategies for persuasion, they have allowed people to implement old strategies in new ways (see Khaslavsky et al.'s "Understanding Seductive Experiences" in this issue). For example, role playing (acting out scenarios with others) has helped people think and behave differently [3]. Computing technology can facilitate role playing by providing people with virtual environments or simulated situations.

Each of the five representative technologies in Table 1 employs a strategy or set of strategies we find notable. In every case, these strategies are adaptations ofand sometimes improvements onlow-tech persuasion strategies. Although Table 2 lists only one strategy for each technology, these same strategies are used in many other persuasive technologies.

Simulated experiences. Simulation, a strategy used not only by Baby Think It Over but by a number of other persuasive technologies, has many benefits. The technology can present a user with an environment or object similar to its real counterpart. However, decisions in a simulation are the key to the strategy's persuasiveness; choices can be made in the simulation with no adverse consequences in real life. Wrong choices can demonstrate the negative results that might occur, while "better" choices result in positive outcomes. These choices can then be duplicated in the user's own life.

Surveillance (monitoring and tracking). Exemplified by Hygiene Guard, surveillance is a controversial persuasive technique. Knowing that one is being monitored or tracked can significantly affect a person's behavior, but the corresponding loss of personal freedom or personal privacy can render surveillance closer to coercion and manipulation than persuasion. This strategy, though relatively easy to deploy, raises red flags. But loss of personal freedom doesn't mean surveillance is always unethical or undesirable. In the case of Hygiene Guard, surveillance technology benefits customers, diners, patients, and employees alike. Yet the cost can be significant, including heightened distrust in employer-employee relationships.

Environments of discovery. Creating such environments is not a single persuasive strategy. Rather, when done well, these environments combine many strategies into one coherent experience. In the case of 5-A-Day Adventures, people can enter the environment and explore games and activities designed to promote a central themelike "Eating fruits and vegetables is a good thing to do." The three chief components of this environment of discovery are: providing a fantasy environment for users; giving them control over much of the environment; and giving them positive feedback for performing target activities.

Virtual groups. Onsale.com makes use of group-level intrinsic motivatorscompetition and recognitionto motivate people in its online auction environment [2]. Auctions are naturally competitive, but Onsale.com makes the competitive aspect highly prominent in its interface and in the types of interactions it allows. Buying is framed not as spending money to receive goods but as "playing" in auctions to "win" the purchase. Participants are goaded with comments like, "You're not going to let that other bidder beat you, are you?" Those who "win" are recognized publicly in the online environment.

Personalizing. Tailoring information to users can be (but is not always) a persuasive strategy. Scorecard.org aims to persuade people to protect the environment by giving them information about environmental threats in their communities. The premise is that the need for action becomes apparent once the facts are known, so the strategy is to provide those facts. In general, tailored information receives more attentionand is therefore potentially more persuasivethan general information. But the key to Scorecard.org's strategy is that tailored information is likely to spur people to action by creating fear or concern. Technologies that tailor information don't always rely on fear; they often simply outline the best path for users, such as how to create and follow a personal budget. Although people have long tailored information to their audiences, computer technology takes us far beyond the realm of what humans can do manually or verbally.

Of all these persuasive strategies, twosimulation and surveillanceare especially noteworthy. Both are made possible by computer technology in ways human systems cannot match easily. They have a high potential for persuasion but work in very different ways. While simulations allow users to draw their own conclusions and adopt appropriate behaviors, surveillance is almost the opposite, possibly compelling users to perform certain behaviors. In fact, a question that still needs an answer, at least in our minds, is whether surveillance is a type of persuasion or a type of coercion. The answer likely depends on the specifics of each persuasive computing system. Despite these differences, both strategies will be common in future technologies.

Back to Top

Conclusion

Analyzing the small but expanding landscape of persuasive technologies has given us a starting point for projecting into the future, as well as for creating a framework for categorization. The probable melding of persuasion and technology is that future persuasive technologies will be a superset of the current technologies. The domains we've outlined herebuying and branding, health, and safetywill certainly expand. Persuasive technologies will also likely be incorporated into other domains, including self-help. Users of persuasive technologies will also be more varied, including more adults. Finally, as more persuasive technologies are built into ordinary objects and environments, people using them won't view them as computers. Like using the telephone and the TV, persuasive computing may eventually become a seamless extension of a person's everyday activities.

Back to Top

References

1. Fogg, B., and Nass, C. Silicon sycophants: The effects of computers that flatter. Int. J. Hum.-Comput. Stud. 46 (1997), 551561.

2. Malone, T., and Lepper, M. Making learning fun: A taxonomy of intrinsic motivations for learning. In Aptitude, Learning, and Instruction: Cognitative and Affective Process Analyses, R. Snow and M. Farr, Eds. Erlbaum, Hillsdale, N.J., 1987, pp. 223253.

3. Petty, R., and Cacioppo, J. Attitudes and Persuasion: Classic and Contemporary Approaches. W. C. Brown Co., Dubuque, Iowa, 1981.

4. Rao, H., Salam, A., and DosSantos, B., Guest Eds. Marketing and the Internet. Commun. ACM 41, 3 (Mar. 1998), 3234.

5. Strachan, W., and Gorey, K. Infant simulator lifespace intervention: Pilot investigation of an adolescent pregnancy prevention program. Child Adolescent Soc. Work J. 14, 2 (June 1997).

Back to Top

Authors

Phillip King (pking@netschools.net) is a hardware design engineer at NetSchools in Mountain View, Calif.

Jason Tester (jasonjt@stanford.edu) is a research and design engineer at the Persuasive Technology Lab at Stanford University, Palo Alto, Calif.

Back to Top

Tables

T1Table 1. Representative persuasive technologies

T2Table 2. Five persuasive technologies and related strategies

Back to Top

UF1-1Figure.

UF1-2Figure.

UF1-3Figure.

UF1-4Figure.


©1999 ACM  0002-0782/99/0500  $5.00

Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee.

The Digital Library is published by the Association for Computing Machinery. Copyright © 1999 ACM, Inc.


 

No entries found