Instructions
If you intend to use this component with Finsweet's Table of Contents attributes follow these steps:
  1. Remove the current class from the content27_link item as Webflows native current state will automatically be applied.
  2. To add interactions which automatically expand and collapse sections in the table of contents select the content27_h-trigger element, add an element trigger and select Mouse click (tap)
  3. For the 1st click select the custom animation Content 27 table of contents [Expand] and for the 2nd click select the custom animation Content 27 table of contents [Collapse].
  4. In the Trigger Settings, deselect all checkboxes other than Desktop and above. This disables the interaction on tablet and below to prevent bugs when scrolling.

Chapter 9: Forcing and blocking

Forcing typically involves putting a mandatory step in front of the action the user wants to complete, which they cannot decline. Blocking involves preventing the user from doing the thing they want to do. For example, if a user wants to export their data, the business prevents it by simply not offering this feature, or mentioning it anywhere. In turn this locks in the user, and makes it impossible for them to leave without saying goodbye to their data.

Perhaps some of the most famous examples of forcing and blocking are in the use of coffee pod machines and printer ink.

Coffee machine manufacturer Keurig is well known for its K-Cup pod machines that require the user to insert a specially designed ‘brew pod’ for every cup of coffee they make. After being on the market for a while, some competitors created copies of the Keurig pods, allowing consumers to choose who to buy their coffee from. This bothered Keurig, as it was eating into its profits; their business model was to sell the machine at a relatively low price, and then to lock in consumers, making long-term profit from them as they were forced to buy all their coffee from Keurig. In 2015, Keurig’s response to this was to add digital rights management (DRM) to their pods and machines. This involved putting radio-frequency identification (RFID) chips on every pod, so that the machine could check whether the pod was manufactured by Keurig or by a competitor.

Amusingly, this backfired as customers created YouTube videos and guides showing how to circumvent the DRM – all you needed to do was...

Amusingly, this backfired as customers created YouTube videos and guides showing how to circumvent the DRM – all you needed to do was cut the RFID chip off an old pod and place it onto the sensor of your machine1.

More recently, printer manufacturer HP Inc. has been engaging in very similar tricks.2 In March 2023, many HP customers woke up one morning to find that HP had hobbled the functionality of their printers via a cloud update, so they no longer accepted third-party ink cartridges. This meant that some printers simply stopped working overnight, even though they were working fine and were full of ink – the only problem was that they contained ink cartridges manufactured by a competitor.

In the world of interface design and software, it’s even easier to add forcing and blocking functions as it takes very little effort to create and rearrange pages. We’ll cover this in part 3 on types of deceptive pattern.

Buy the book...

Since 2010, Harry Brignull has dedicated his career to understanding and exposing the techniques that are employed to exploit users online, known as “deceptive patterns” or “dark patterns”. He is credited with coining a number of the terms that are now popularly used in this research area, and is the founder of the website deceptive.design. He has worked as an expert witness on a number of cases, including Nichols v. Noom Inc. ($56 million settlement), and FTC v. Publishers Clearing House LLC ($18.5 million settlement). Harry is also an accomplished user experience practitioner, having worked for organisations that include Smart Pension, Spotify, Pearson, HMRC, and the Telegraph newspaper.