SlideShare a Scribd company logo
Ulysses in Cyberspace:
Distraction and Self-Regulation in Social
Machines
Ulrik Lyngs
1. Background:
ICTs and Self-Regulation
Constant connectivity
2,617
touches/day1
76
sessions/day1
1. dscout 2016, Mobile Touches
The self-regulation challenge
The self-regulation challenge
• Constantly-connected
universal machines
• Attention economy
• Human cognitive constraints
2.
The Anti-Distraction Market
The Anti-Distraction Market
Remove
distraction
s
Usage
informatio
n
Reward
/
punish
Forest
World’s
Most
Dangerous
Writing App
RescueTime
meTime
Focus Booster
Stay Focused
TimeStats
Freedom
Self-Control
Anti-Social OFFTIME
DriveCare
Think
Isolator
Spirited
Away
News Feed
Eradicator
DistractaGone
Yondr
Write or Die
Clear Focus
Clockwork
Tomato
CARROT
QualityTime
Remove distractions
Picture representing Freedom
Usage statistics
Reward/punish
Freedom
Self Control
Anti-Social
OFFTIME
RescueTime
Think (by Freeverse)
Isolator
Spirited Away
Focus Booster
World's Most
Dangerous Writing
App
Freelancer
Forest: stay focused
DistractaGone
Yondr
NUGU
DriveCare
Focus
StayFocused
Timestats
Tracktime
MeTime
Focus Writer
Isolator
FocusMask
Moment
SnuzNLuz
Pavlok
MOTI
Facebook Demetricator
WasteNoTime
Time
Groove
Momo ltd
FB Purity
RescueTime + real life
Google Contributor
BasicAttentionToken
Twist
Plan-and-Play
MyTime
AppDetox
QualityTime
PreventDark
BreakFree
Phone Addiction Blocker
Smartphone addiction
stopper
Smartphone addiction
Timerlock
Timeout - Control Your
Smartphone Addiction
Detox Launcher
Detox Procrastination Blocker
Smartphone Addiction
System
NoTouch
No More Smartphone
Addiction
Self Control for Study
Smartphone Junkie Alarm
Time Used
Time Lock
Newsfeed Eradicator
Smartphone Addict
Heads Up
Help Me Focus - Boost
Productivity
Phone Detox - Control App
Use
Stay Focused | Study Help
AppBlock - Stay Focused
DrunkMode
AppDetox
3.
The Design Space for
Anti-Distraction Tools
The Design Space for Anti-Distraction
Tools
• Can we use self-regulation research to understand the design
space of anti-distraction tools, classify them, and predict their
effects?
(adapted from
Shea et al. 2014)
System 2
control
System 1
control
Reward
Expectanc
yDelay
Expected
value of
control
Metacognitive
representatio
ns
Metacognitive
representatio
ns
Competition
between
action
schemas
Effector
system
Action
Sensory
input
Usage information
Remove distractions
Reward/punishment
Q&A

More Related Content

Similar to Ulysses in Cyberspace: Distraction and Self-Regulation in Social Machines

Personal, Private, Professional: Surviving Social Media
Personal, Private, Professional: Surviving Social MediaPersonal, Private, Professional: Surviving Social Media
Personal, Private, Professional: Surviving Social MediaMathias Klang
 
Designing Learning Experiences for the New Microcosmos.
Designing Learning Experiences for the New Microcosmos. Designing Learning Experiences for the New Microcosmos.
Designing Learning Experiences for the New Microcosmos.
jurijmlotman
 
Artificial Intelligence for Goods: Cases and Tools
Artificial Intelligence for Goods: Cases and ToolsArtificial Intelligence for Goods: Cases and Tools
Artificial Intelligence for Goods: Cases and Tools
Oleksandr Krakovetskyi
 
Social Machines Democratization
Social Machines DemocratizationSocial Machines Democratization
Social Machines Democratization
David De Roure
 
Simple
SimpleSimple
Simple
MH Rubin
 
Catholic Social Thought and the Openness Revolution: natural travel companion...
Catholic Social Thought and the Openness Revolution: natural travel companion...Catholic Social Thought and the Openness Revolution: natural travel companion...
Catholic Social Thought and the Openness Revolution: natural travel companion...
Marco Fioretti
 
Media assignment
Media assignmentMedia assignment
Media assignment
airwin3
 
The Power Of One - Hyperlinked
The Power Of One - HyperlinkedThe Power Of One - Hyperlinked
The Power Of One - Hyperlinked
Deon van der Merwe
 
The Power of One
The Power of OneThe Power of One
The Power of One
Deon van der Merwe
 
Interaction & Design
Interaction & DesignInteraction & Design
Interaction & Design
Arlton Lowry
 
Film 260 Flipbook - The Age of Distraction
Film 260 Flipbook - The Age of Distraction Film 260 Flipbook - The Age of Distraction
Film 260 Flipbook - The Age of Distraction
alessiabertucci
 
When-Technology-and-the-Humanity-Cross.pptx
When-Technology-and-the-Humanity-Cross.pptxWhen-Technology-and-the-Humanity-Cross.pptx
When-Technology-and-the-Humanity-Cross.pptx
JesabelAntonio
 
Technology creates social isolation and neurosis social impact of technology
Technology creates social isolation and neurosis    social impact of technologyTechnology creates social isolation and neurosis    social impact of technology
Technology creates social isolation and neurosis social impact of technology
rajakalsi
 
Dan Schultz: Designing a strategy for mobile innovation
Dan Schultz: Designing a strategy for mobile innovationDan Schultz: Designing a strategy for mobile innovation
Dan Schultz: Designing a strategy for mobile innovation
Reynolds Journalism Institute (RJI)
 
The Ethics of Artificial Intelligence
The Ethics of Artificial IntelligenceThe Ethics of Artificial Intelligence
The Ethics of Artificial Intelligence
Karl Seiler
 
Learning from ubicomp deployments keio 2010
Learning from ubicomp deployments keio 2010Learning from ubicomp deployments keio 2010
Learning from ubicomp deployments keio 2010
Adrian Friday
 

Similar to Ulysses in Cyberspace: Distraction and Self-Regulation in Social Machines (17)

Personal, Private, Professional: Surviving Social Media
Personal, Private, Professional: Surviving Social MediaPersonal, Private, Professional: Surviving Social Media
Personal, Private, Professional: Surviving Social Media
 
Designing Learning Experiences for the New Microcosmos.
Designing Learning Experiences for the New Microcosmos. Designing Learning Experiences for the New Microcosmos.
Designing Learning Experiences for the New Microcosmos.
 
Artificial Intelligence for Goods: Cases and Tools
Artificial Intelligence for Goods: Cases and ToolsArtificial Intelligence for Goods: Cases and Tools
Artificial Intelligence for Goods: Cases and Tools
 
Social Machines Democratization
Social Machines DemocratizationSocial Machines Democratization
Social Machines Democratization
 
Simple
SimpleSimple
Simple
 
Catholic Social Thought and the Openness Revolution: natural travel companion...
Catholic Social Thought and the Openness Revolution: natural travel companion...Catholic Social Thought and the Openness Revolution: natural travel companion...
Catholic Social Thought and the Openness Revolution: natural travel companion...
 
Media assignment
Media assignmentMedia assignment
Media assignment
 
Social media
Social mediaSocial media
Social media
 
The Power Of One - Hyperlinked
The Power Of One - HyperlinkedThe Power Of One - Hyperlinked
The Power Of One - Hyperlinked
 
The Power of One
The Power of OneThe Power of One
The Power of One
 
Interaction & Design
Interaction & DesignInteraction & Design
Interaction & Design
 
Film 260 Flipbook - The Age of Distraction
Film 260 Flipbook - The Age of Distraction Film 260 Flipbook - The Age of Distraction
Film 260 Flipbook - The Age of Distraction
 
When-Technology-and-the-Humanity-Cross.pptx
When-Technology-and-the-Humanity-Cross.pptxWhen-Technology-and-the-Humanity-Cross.pptx
When-Technology-and-the-Humanity-Cross.pptx
 
Technology creates social isolation and neurosis social impact of technology
Technology creates social isolation and neurosis    social impact of technologyTechnology creates social isolation and neurosis    social impact of technology
Technology creates social isolation and neurosis social impact of technology
 
Dan Schultz: Designing a strategy for mobile innovation
Dan Schultz: Designing a strategy for mobile innovationDan Schultz: Designing a strategy for mobile innovation
Dan Schultz: Designing a strategy for mobile innovation
 
The Ethics of Artificial Intelligence
The Ethics of Artificial IntelligenceThe Ethics of Artificial Intelligence
The Ethics of Artificial Intelligence
 
Learning from ubicomp deployments keio 2010
Learning from ubicomp deployments keio 2010Learning from ubicomp deployments keio 2010
Learning from ubicomp deployments keio 2010
 

More from Ulrik Lyngs

Social Machines: Theoretical perspectives, Paul Smart
Social Machines: Theoretical perspectives, Paul SmartSocial Machines: Theoretical perspectives, Paul Smart
Social Machines: Theoretical perspectives, Paul Smart
Ulrik Lyngs
 
Mandevillian Intelligence, Paul Smart
Mandevillian Intelligence, Paul SmartMandevillian Intelligence, Paul Smart
Mandevillian Intelligence, Paul Smart
Ulrik Lyngs
 
Human-Extended Machine Cognition, Paul Smart
Human-Extended Machine Cognition, Paul SmartHuman-Extended Machine Cognition, Paul Smart
Human-Extended Machine Cognition, Paul Smart
Ulrik Lyngs
 
Understanding Algorithmic Decisions
Understanding Algorithmic DecisionsUnderstanding Algorithmic Decisions
Understanding Algorithmic Decisions
Ulrik Lyngs
 
Zooniverse Update
Zooniverse UpdateZooniverse Update
Zooniverse Update
Ulrik Lyngs
 
Data sharing in the age of the Social Machine
Data sharing in the age of the Social MachineData sharing in the age of the Social Machine
Data sharing in the age of the Social Machine
Ulrik Lyngs
 
SoLiD co operating.systems
SoLiD co operating.systemsSoLiD co operating.systems
SoLiD co operating.systems
Ulrik Lyngs
 
Sociagrams: How to design a social machine
Sociagrams: How to design a social machineSociagrams: How to design a social machine
Sociagrams: How to design a social machine
Ulrik Lyngs
 
Safe Haven in a Box, Petros Papapanagiotou
Safe Haven in a Box, Petros PapapanagiotouSafe Haven in a Box, Petros Papapanagiotou
Safe Haven in a Box, Petros Papapanagiotou
Ulrik Lyngs
 
App Observatory
App ObservatoryApp Observatory
App Observatory
Ulrik Lyngs
 
Privacy-Preserving Data Analysis, Adria Gascon
Privacy-Preserving Data Analysis, Adria GasconPrivacy-Preserving Data Analysis, Adria Gascon
Privacy-Preserving Data Analysis, Adria Gascon
Ulrik Lyngs
 
A Privacy Framework for Social Machines
A Privacy Framework for Social MachinesA Privacy Framework for Social Machines
A Privacy Framework for Social Machines
Ulrik Lyngs
 
SOCIAM Book: The Theory and Practice of Social Machines
SOCIAM Book: The Theory and Practice of Social MachinesSOCIAM Book: The Theory and Practice of Social Machines
SOCIAM Book: The Theory and Practice of Social Machines
Ulrik Lyngs
 
Provenance and Analytics for Social Machines, Trung Dong Huynh
Provenance and Analytics for Social Machines, Trung Dong HuynhProvenance and Analytics for Social Machines, Trung Dong Huynh
Provenance and Analytics for Social Machines, Trung Dong Huynh
Ulrik Lyngs
 

More from Ulrik Lyngs (14)

Social Machines: Theoretical perspectives, Paul Smart
Social Machines: Theoretical perspectives, Paul SmartSocial Machines: Theoretical perspectives, Paul Smart
Social Machines: Theoretical perspectives, Paul Smart
 
Mandevillian Intelligence, Paul Smart
Mandevillian Intelligence, Paul SmartMandevillian Intelligence, Paul Smart
Mandevillian Intelligence, Paul Smart
 
Human-Extended Machine Cognition, Paul Smart
Human-Extended Machine Cognition, Paul SmartHuman-Extended Machine Cognition, Paul Smart
Human-Extended Machine Cognition, Paul Smart
 
Understanding Algorithmic Decisions
Understanding Algorithmic DecisionsUnderstanding Algorithmic Decisions
Understanding Algorithmic Decisions
 
Zooniverse Update
Zooniverse UpdateZooniverse Update
Zooniverse Update
 
Data sharing in the age of the Social Machine
Data sharing in the age of the Social MachineData sharing in the age of the Social Machine
Data sharing in the age of the Social Machine
 
SoLiD co operating.systems
SoLiD co operating.systemsSoLiD co operating.systems
SoLiD co operating.systems
 
Sociagrams: How to design a social machine
Sociagrams: How to design a social machineSociagrams: How to design a social machine
Sociagrams: How to design a social machine
 
Safe Haven in a Box, Petros Papapanagiotou
Safe Haven in a Box, Petros PapapanagiotouSafe Haven in a Box, Petros Papapanagiotou
Safe Haven in a Box, Petros Papapanagiotou
 
App Observatory
App ObservatoryApp Observatory
App Observatory
 
Privacy-Preserving Data Analysis, Adria Gascon
Privacy-Preserving Data Analysis, Adria GasconPrivacy-Preserving Data Analysis, Adria Gascon
Privacy-Preserving Data Analysis, Adria Gascon
 
A Privacy Framework for Social Machines
A Privacy Framework for Social MachinesA Privacy Framework for Social Machines
A Privacy Framework for Social Machines
 
SOCIAM Book: The Theory and Practice of Social Machines
SOCIAM Book: The Theory and Practice of Social MachinesSOCIAM Book: The Theory and Practice of Social Machines
SOCIAM Book: The Theory and Practice of Social Machines
 
Provenance and Analytics for Social Machines, Trung Dong Huynh
Provenance and Analytics for Social Machines, Trung Dong HuynhProvenance and Analytics for Social Machines, Trung Dong Huynh
Provenance and Analytics for Social Machines, Trung Dong Huynh
 

Recently uploaded

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 

Recently uploaded (20)

Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 

Ulysses in Cyberspace: Distraction and Self-Regulation in Social Machines

Editor's Notes

  1. Cognitive constraints: Limits on our ability to do top-down inhibition of distracting stimuli Limits on how much we can fit into our working memory
  2. Can be loosely categorised by their intervention method Last cateogory tweaks user interfaces to Reward/punish desired behaviour