08.11.2014 Views

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

screening methods were used to check everyone who came near the event.<br />

Advanced sensors sniffed the air. 23<br />

While discussing how computers or cyber technologies can be used<br />

surreptitiously to communicate with members of a group, New York Times<br />

reporter Tom Zeller wrote that<br />

At one website, spammimic.com, a user can type in a phrase like “Meet<br />

me at Joe’s” and have that message automatically converted into a<br />

lengthy bit of prose that reads like a spam message: “Dear Decision<br />

maker—Your email address has been submitted to us indicating your<br />

interest in our briefing! This is a one-time mailing and there is no need<br />

to request removal if you won’t want any more.” 24<br />

The words are pasted into an email message and sent. The receiver of the email,<br />

on the lookout for such a message, then pastes it into the machine’s decoder to<br />

read the original message. 25 Thus the uses of computers and their related<br />

activities are spreading and becoming more creative. Militaries and law<br />

enforcement agencies are having a hard time staying ahead of this transnational<br />

creativity.<br />

Professor B.J. Fogg of Stanford University is a leader in a more<br />

specialized use of cyber technologies, yet one most people haven’t thought<br />

much about. It is the use of cyber technologies strictly for purposes of<br />

persuasion. He runs a persuasive technology laboratory at Palo Alto, California.<br />

Fogg and his staff are creating a “body of expertise in the design, theory, and<br />

analysis of persuasive technologies, an area called ‘captology’.” 26 Dr. Fogg<br />

introduces users to devices that remind, reward, or monitor behavior, and<br />

thereby influence attitudes. 27 Persuasive technologies can induce flattery,<br />

seduction, fantasy, competition, humor, positive reinforcement, and appeals to<br />

the conscience. The difficulty, of course, is deciding what is persuasion and not<br />

manipulation or coercion. 28 Dr. Fogg has written a book titled Persuasive<br />

Technology that has two chapters of particular relevance–“Persuasion in the<br />

Digital Age” and “Credibility and the World Wide Web.” These chapters, as<br />

23 Sari Horwitz and Spencer S. Hsu, “Inaugural Security Draws on Latest<br />

Technologies,” WashingtonPost.com, 10 January 2005, p. A1.<br />

24 Tom Zeller, Jr., “On the Open Internet, a Web of Dark Alleys,” The New York<br />

Times, 20 December 2004.<br />

25 Ibid.<br />

26 “Captology: Computers as Persuasive Technologies,” at<br />

http://captology.stanford.edu.<br />

27 Taken from http://captology.stanford.edu/Examples/examples.html.<br />

28 Gary H. Anthes, “Persuasive Technologies,” Computerworld, 28 June 1999, p. 76.<br />

17

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!