cbrowser 18.63.0 → 18.63.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (71) hide show
  1. package/package.json +1 -1
  2. package/docs/ASSESSMENT.md +0 -132
  3. package/docs/AUTH0-SETUP.md +0 -207
  4. package/docs/COGNITIVE-OPTIMAL-TRANSPORT-RESEARCH.md +0 -238
  5. package/docs/DEMO-DEPLOYMENT.md +0 -177
  6. package/docs/ENTERPRISE-INTEGRATION.md +0 -250
  7. package/docs/GETTING-STARTED.md +0 -232
  8. package/docs/INSTALL.md +0 -274
  9. package/docs/MCP-INTEGRATION.md +0 -301
  10. package/docs/METHODOLOGY.md +0 -276
  11. package/docs/PERSONA-QUESTIONNAIRE.md +0 -328
  12. package/docs/README.md +0 -45
  13. package/docs/REMOTE-MCP-SERVER.md +0 -569
  14. package/docs/SECURITY_WHITEPAPER.md +0 -475
  15. package/docs/STRESS-TEST-v16.14.4.md +0 -241
  16. package/docs/Tool-Cognitive-Journey-Autonomous.md +0 -270
  17. package/docs/Tool-Competitive-Benchmark.md +0 -293
  18. package/docs/Tool-Empathy-Audit.md +0 -331
  19. package/docs/Tool-Hunt-Bugs.md +0 -305
  20. package/docs/Tool-Marketing-Campaign.md +0 -298
  21. package/docs/Tool-Persona-Create.md +0 -274
  22. package/docs/Tools-Accessibility.md +0 -208
  23. package/docs/Tools-Browser-Automation.md +0 -311
  24. package/docs/Tools-Cognitive-Journeys.md +0 -233
  25. package/docs/Tools-Marketing-Intelligence.md +0 -271
  26. package/docs/Tools-Overview.md +0 -162
  27. package/docs/Tools-Persona-System.md +0 -300
  28. package/docs/Tools-Session-State.md +0 -278
  29. package/docs/Tools-Testing-Quality.md +0 -257
  30. package/docs/Tools-Utilities.md +0 -182
  31. package/docs/Tools-Visual-Performance.md +0 -278
  32. package/docs/hunt-bugs-coverage.md +0 -103
  33. package/docs/personas/Persona-ADHD.md +0 -141
  34. package/docs/personas/Persona-ElderlyUser.md +0 -137
  35. package/docs/personas/Persona-FirstTimer.md +0 -137
  36. package/docs/personas/Persona-ImpatientUser.md +0 -138
  37. package/docs/personas/Persona-Index.md +0 -302
  38. package/docs/personas/Persona-LowVision.md +0 -139
  39. package/docs/personas/Persona-MobileUser.md +0 -139
  40. package/docs/personas/Persona-MotorTremor.md +0 -139
  41. package/docs/personas/Persona-PowerUser.md +0 -135
  42. package/docs/personas/Persona-ScreenReaderUser.md +0 -139
  43. package/docs/research/Bibliography.md +0 -275
  44. package/docs/research/Research-Methodology.md +0 -244
  45. package/docs/research/Values-Research.md +0 -432
  46. package/docs/traits/Trait-AnchoringBias.md +0 -227
  47. package/docs/traits/Trait-AttributionStyle.md +0 -280
  48. package/docs/traits/Trait-AuthoritySensitivity.md +0 -141
  49. package/docs/traits/Trait-ChangeBlindness.md +0 -171
  50. package/docs/traits/Trait-Comprehension.md +0 -180
  51. package/docs/traits/Trait-Curiosity.md +0 -189
  52. package/docs/traits/Trait-EmotionalContagion.md +0 -144
  53. package/docs/traits/Trait-FOMO.md +0 -150
  54. package/docs/traits/Trait-Index.md +0 -166
  55. package/docs/traits/Trait-InformationForaging.md +0 -217
  56. package/docs/traits/Trait-InterruptRecovery.md +0 -249
  57. package/docs/traits/Trait-MentalModelRigidity.md +0 -228
  58. package/docs/traits/Trait-MetacognitivePlanning.md +0 -164
  59. package/docs/traits/Trait-Patience.md +0 -137
  60. package/docs/traits/Trait-Persistence.md +0 -165
  61. package/docs/traits/Trait-ProceduralFluency.md +0 -205
  62. package/docs/traits/Trait-ReadingTendency.md +0 -216
  63. package/docs/traits/Trait-Resilience.md +0 -162
  64. package/docs/traits/Trait-RiskTolerance.md +0 -162
  65. package/docs/traits/Trait-Satisficing.md +0 -181
  66. package/docs/traits/Trait-SelfEfficacy.md +0 -199
  67. package/docs/traits/Trait-SocialProofSensitivity.md +0 -155
  68. package/docs/traits/Trait-TimeHorizon.md +0 -267
  69. package/docs/traits/Trait-TransferLearning.md +0 -249
  70. package/docs/traits/Trait-TrustCalibration.md +0 -227
  71. package/docs/traits/Trait-WorkingMemory.md +0 -192
@@ -1,249 +0,0 @@
1
- > **This documentation is no longer maintained here.**
2
- >
3
- > For the latest version, please visit: **[Transfer Learning](https://cbrowser.ai/docs/Trait-TransferLearning)**
4
-
5
- ---
6
-
7
- # Transfer Learning
8
-
9
- **Category**: Tier 4 - Planning Traits
10
- **Scale**: 0.0 (low) to 1.0 (high)
11
-
12
- ## Definition
13
-
14
- Transfer Learning measures a user's ability to apply knowledge, skills, and strategies learned in one context to new, different contexts. Users with high transfer learning recognize structural similarities between interfaces they have used before and novel interfaces, allowing them to leverage past experience even when surface features differ. They can generalize from "I know how Amazon checkout works" to "this unfamiliar e-commerce site probably works similarly." Low transfer learners treat each new interface as completely novel, unable to recognize that the skills they developed on one website apply to others, resulting in repeated re-learning of equivalent procedures.
15
-
16
- ## Research Foundation
17
-
18
- ### Primary Citation
19
-
20
- > "The mind is so specialized in its structure that only alterations of elements very much like the practiced elements are likely to affect the performance... transfer of practice occurs only where identical elements are concerned."
21
- > -- Thorndike & Woodworth, 1901, p. 250
22
-
23
- **Full Citation (APA 7):**
24
- Thorndike, E. L., & Woodworth, R. S. (1901). The influence of improvement in one mental function upon the efficiency of other functions. *Psychological Review*, 8(3), 247-261.
25
-
26
- **DOI**: https://doi.org/10.1037/h0074898
27
-
28
- ### Supporting Research
29
-
30
- > "Transfer is not automatic. Students often fail to spontaneously apply knowledge learned in one context to new situations, even when the underlying principles are identical."
31
- > -- Perkins & Salomon, 1992
32
-
33
- **Full Citation (APA 7):**
34
- Perkins, D. N., & Salomon, G. (1992). Transfer of learning. In T. Husen & T. N. Postlethwaite (Eds.), *International encyclopedia of education* (2nd ed., pp. 6452-6457). Pergamon Press.
35
-
36
- ### Key Numerical Values
37
-
38
- | Metric | Value | Source |
39
- |--------|-------|--------|
40
- | Spontaneous transfer rate | 10-30% | Gick & Holyoak (1980) |
41
- | Transfer with hints | 75-90% | Gick & Holyoak (1983) |
42
- | Near transfer success | 60-80% | Barnett & Ceci (2002) |
43
- | Far transfer success | 10-40% | Barnett & Ceci (2002) |
44
- | Identical elements threshold | 60-70% overlap | Thorndike & Woodworth (1901) |
45
- | Analogical mapping time | 2-5 seconds | Gentner (1983) |
46
- | Expert transfer advantage | 2-3x novices | Chi et al. (1981) |
47
-
48
- ## Behavioral Levels
49
-
50
- | Value | Label | Behaviors |
51
- |-------|-------|-----------|
52
- | 0.0-0.2 | Very Low | Treats every website as completely novel; does not recognize common UI patterns across sites; re-learns login, navigation, and checkout on each new site; cannot apply previous experience; asks for help on familiar-type tasks; no generalization from examples |
53
- | 0.2-0.4 | Low | Recognizes only identical interfaces; slight variations cause confusion; can transfer within same website but not across sites; requires explicit instruction for each new context; occasional recognition of very common patterns (e.g., shopping cart icon) |
54
- | 0.4-0.6 | Moderate | Recognizes common UI patterns across similar sites; can generalize within categories (e-commerce to e-commerce); hesitates on novel combinations; transfers after brief exploration; needs some adaptation time for new patterns |
55
- | 0.6-0.8 | High | Quick pattern recognition across diverse sites; structural mapping enables rapid adaptation; recognizes analogous functions despite different appearances; transfers strategies effectively; minimal re-learning needed |
56
- | 0.8-1.0 | Very High | Instant structural recognition; applies appropriate mental models immediately; transfers across disparate domains; recognizes deep patterns beneath surface differences; can articulate transferable principles; effectively predicts how unfamiliar interfaces will behave |
57
-
58
- ## Web/UI Behavioral Patterns
59
-
60
- ### Cross-Site Navigation
61
-
62
- | Level | Observed Behavior |
63
- |-------|-------------------|
64
- | Very Low | Completely lost on new sites; does not look for familiar patterns; ignores navigation conventions; cannot find equivalent features |
65
- | Low | Eventually finds features through trial and error; does not initially look for familiar patterns; slow recognition |
66
- | Moderate | Looks for navigation menu in expected locations; finds equivalent features within same site category |
67
- | High | Immediately scans expected locations; quickly maps novel UI to familiar patterns; finds features on first or second try |
68
- | Very High | Instant mental model formation; predicts site structure; finds features immediately; adapts to unconventional designs |
69
-
70
- ### Learning New Interfaces
71
-
72
- | Level | Observed Behavior |
73
- |-------|-------------------|
74
- | Very Low | Requires complete tutorial for each new site; cannot skip instructions; each interface is a fresh learning experience |
75
- | Low | Benefits from tutorials; slow to explore independently; gradual skill building within single site |
76
- | Moderate | Skims tutorials; explores based on prior experience; learns new patterns reasonably quickly |
77
- | High | Rarely needs tutorials; explores confidently; rapidly acquires new interface patterns |
78
- | Very High | No tutorials needed; immediately productive; teaches self new patterns through analogy |
79
-
80
- ### Pattern Recognition Examples
81
-
82
- | Level | What They Recognize |
83
- |-------|---------------------|
84
- | Very Low | Only exact matches (same site, same button) |
85
- | Low | Same icons, same text labels across sites |
86
- | Moderate | Standard icons (cart, search, menu) regardless of styling |
87
- | High | Functional equivalents (hamburger menu = navigation), layout patterns (header/content/footer) |
88
- | Very High | Deep structural patterns (progressive disclosure, wizard flows, card-based layouts), design system conventions |
89
-
90
- ### Cross-Domain Transfer
91
-
92
- | Level | Example Transfer Capability |
93
- |-------|----------------------------|
94
- | Very Low | Cannot transfer from web to mobile app, even for same service |
95
- | Low | Transfers within identical apps on different devices |
96
- | Moderate | Transfers between similar apps (Gmail to Outlook, Amazon to eBay) |
97
- | High | Transfers from consumer apps to enterprise software; recognizes patterns in unfamiliar domains |
98
- | Very High | Transfers abstract principles (progressive disclosure, information hierarchy) across all digital interfaces |
99
-
100
- ## Transfer Distance Taxonomy
101
-
102
- Based on Barnett & Ceci (2002), transfer distance affects success rate:
103
-
104
- | Transfer Type | Distance | Success Rate | Example |
105
- |---------------|----------|--------------|---------|
106
- | Near-Near | Same site, same task | 95% | Amazon checkout today vs. yesterday |
107
- | Near | Same category, similar UI | 60-80% | Amazon to eBay checkout |
108
- | Far | Different category, similar structure | 30-50% | E-commerce checkout to airline booking |
109
- | Very Far | Different domain, abstract similarity | 10-30% | Web form skills to mobile app form |
110
- | Analogical | Structural similarity only | 10-20% | Folder organization to database organization |
111
-
112
- ## Estimated Trait Correlations
113
-
114
- > *Correlation estimates are derived from related research findings and theoretical models. Empirical calibration is planned ([GitHub #95](https://github.com/alexandriashai/cbrowser/issues/95)).*
115
-
116
- | Related Trait | Correlation | Research Basis |
117
- |---------------|-------------|----------------|
118
- | [Comprehension](./Trait-Comprehension.md) | r = 0.61 | Deep comprehension enables recognition of structural similarities (Chi et al., 1981) |
119
- | [Procedural Fluency](./Trait-ProceduralFluency.md) | r = 0.62 | Fluent procedures are more transferable than struggling procedures (Anderson, 1982) |
120
- | [Metacognitive Planning](./Trait-MetacognitivePlanning.md) | r = 0.54 | Metacognition enables explicit strategy transfer (Perkins & Salomon, 1992) |
121
- | [Working Memory](./Trait-WorkingMemory.md) | r = 0.45 | Holding source and target representations requires working memory (Gentner, 1983) |
122
- | [Curiosity](./Trait-Curiosity.md) | r = 0.38 | Curious exploration facilitates pattern discovery (Berlyne, 1960) |
123
-
124
- ## Persona Values
125
-
126
- | Persona | Value | Rationale |
127
- |---------|-------|-----------|
128
- | power-user | 0.85 | Extensive experience enables rich pattern library for transfer |
129
- | first-timer | 0.25 | Limited experience means few patterns to transfer from |
130
- | elderly-user | 0.40 | May have transfer from non-digital domains but limited web pattern library |
131
- | impatient-user | 0.50 | Average transfer ability; impatience orthogonal to transfer |
132
- | screen-reader-user | 0.65 | Strong mental models of accessible patterns transfer well |
133
- | mobile-user | 0.55 | Touch patterns transfer within mobile; may not transfer to desktop |
134
- | anxious-user | 0.45 | Anxiety may impair analogical reasoning under stress |
135
-
136
- ## Implementation in CBrowser
137
-
138
- ### State Tracking
139
-
140
- ```typescript
141
- interface TransferLearningState {
142
- knownPatterns: Map<PatternType, PatternExperience>;
143
- currentSiteCategory: SiteCategory;
144
- transferAttempts: TransferAttempt[];
145
- successfulTransfers: number;
146
- failedTransfers: number;
147
- analogicalMappingActive: boolean;
148
- patternLibrarySize: number;
149
- }
150
-
151
- interface PatternExperience {
152
- patternType: PatternType;
153
- exposureCount: number;
154
- lastSeen: number;
155
- successRate: number;
156
- variants: string[]; // Different implementations encountered
157
- }
158
-
159
- interface TransferAttempt {
160
- sourcePattern: PatternType;
161
- targetContext: string;
162
- success: boolean;
163
- distance: 'near' | 'far' | 'very_far';
164
- }
165
-
166
- type SiteCategory =
167
- | 'ecommerce'
168
- | 'social_media'
169
- | 'news'
170
- | 'saas'
171
- | 'government'
172
- | 'banking'
173
- | 'healthcare'
174
- | 'education'
175
- | 'entertainment'
176
- | 'unknown';
177
- ```
178
-
179
- ### Behavioral Modifiers
180
-
181
- - **Pattern recognition time**: High transfer instantly recognizes patterns; low transfer requires full exploration
182
- - **Cross-site confidence**: High transfer maintains confidence on new sites; low transfer shows hesitation
183
- - **Error recovery**: High transfer applies learned recovery strategies; low transfer repeats same errors
184
- - **Learning speed**: High transfer learns new site patterns in 1-2 interactions; low transfer requires 5-10
185
- - **Prediction accuracy**: High transfer predicts where features will be; low transfer uses random exploration
186
-
187
- ### Transfer Calculation
188
-
189
- ```typescript
190
- function calculateTransferSuccess(
191
- transferLevel: number,
192
- sourcePattern: PatternExperience,
193
- targetSimilarity: number, // 0-1, structural similarity
194
- distance: 'near' | 'far' | 'very_far'
195
- ): number {
196
- const distanceMultiplier = {
197
- 'near': 1.0,
198
- 'far': 0.6,
199
- 'very_far': 0.3
200
- };
201
-
202
- const baseRate = transferLevel * distanceMultiplier[distance];
203
- const experienceBonus = Math.min(0.2, sourcePattern.exposureCount * 0.02);
204
- const similarityBonus = targetSimilarity * 0.3;
205
-
206
- return Math.min(1.0, baseRate + experienceBonus + similarityBonus);
207
- }
208
- ```
209
-
210
- ## Identical Elements Theory in Practice
211
-
212
- Thorndike's theory predicts that transfer depends on shared elements between contexts. In web interfaces:
213
-
214
- | Shared Element Type | Transfer Impact | Examples |
215
- |--------------------|-----------------|----------|
216
- | **Visual identical** | Highest (90%+) | Same icon, same color, same position |
217
- | **Functional identical** | High (70-85%) | Different icon but same function (magnifying glass = search) |
218
- | **Structural identical** | Medium (50-70%) | Same layout pattern but different content |
219
- | **Procedural identical** | Medium (40-60%) | Same steps in different order or context |
220
- | **Conceptual identical** | Low (20-40%) | Same underlying principle, different manifestation |
221
-
222
- ## See Also
223
-
224
- - [Trait-ProceduralFluency](./Trait-ProceduralFluency.md) - Fluent procedures that enable transfer
225
- - [Trait-MetacognitivePlanning](./Trait-MetacognitivePlanning.md) - Strategic awareness of transferable knowledge
226
- - [Trait-Comprehension](./Trait-Comprehension.md) - Understanding that enables structural recognition
227
- - [Trait-WorkingMemory](./Trait-WorkingMemory.md) - Capacity for holding analogical mappings
228
- - [Cognitive-User-Simulation](../COGNITIVE-SIMULATION.md) - Main simulation documentation
229
- - [Persona-Index](../personas/Persona-Index.md) - Pre-configured trait combinations
230
-
231
- ## Bibliography
232
-
233
- Anderson, J. R. (1982). Acquisition of cognitive skill. *Psychological Review*, 89(4), 369-406. https://doi.org/10.1037/0033-295X.89.4.369
234
-
235
- Barnett, S. M., & Ceci, S. J. (2002). When and where do we apply what we learn? A taxonomy for far transfer. *Psychological Bulletin*, 128(4), 612-637. https://doi.org/10.1037/0033-2909.128.4.612
236
-
237
- Berlyne, D. E. (1960). *Conflict, arousal, and curiosity*. McGraw-Hill.
238
-
239
- Chi, M. T. H., Feltovich, P. J., & Glaser, R. (1981). Categorization and representation of physics problems by experts and novices. *Cognitive Science*, 5(2), 121-152. https://doi.org/10.1207/s15516709cog0502_2
240
-
241
- Gentner, D. (1983). Structure-mapping: A theoretical framework for analogy. *Cognitive Science*, 7(2), 155-170. https://doi.org/10.1207/s15516709cog0702_3
242
-
243
- Gick, M. L., & Holyoak, K. J. (1980). Analogical problem solving. *Cognitive Psychology*, 12(3), 306-355. https://doi.org/10.1016/0010-0285(80)90013-4
244
-
245
- Gick, M. L., & Holyoak, K. J. (1983). Schema induction and analogical transfer. *Cognitive Psychology*, 15(1), 1-38. https://doi.org/10.1016/0010-0285(83)90002-6
246
-
247
- Perkins, D. N., & Salomon, G. (1992). Transfer of learning. In T. Husen & T. N. Postlethwaite (Eds.), *International encyclopedia of education* (2nd ed., pp. 6452-6457). Pergamon Press.
248
-
249
- Thorndike, E. L., & Woodworth, R. S. (1901). The influence of improvement in one mental function upon the efficiency of other functions. *Psychological Review*, 8(3), 247-261. https://doi.org/10.1037/h0074898
@@ -1,227 +0,0 @@
1
- > **This documentation is no longer maintained here.**
2
- >
3
- > For the latest version, please visit: **[Trust Calibration](https://cbrowser.ai/docs/Trait-TrustCalibration)**
4
-
5
- ---
6
-
7
- # Trust Calibration
8
-
9
- **Category**: Tier 2 - Emotional Traits
10
- **Scale**: 0.0 (low/skeptical) to 1.0 (high/trusting)
11
-
12
- ## Definition
13
-
14
- Trust calibration measures a user's baseline disposition toward trusting or distrusting websites and online services. This trait determines how users evaluate credibility signals, how long they deliberate before committing to actions (especially those involving personal data or financial transactions), and their threshold for perceiving deceptive design patterns. Low-trust users scrutinize security indicators, read privacy policies, and require multiple credibility signals before proceeding. High-trust users click through quickly with minimal verification, potentially exposing themselves to phishing or dark patterns but completing legitimate flows more efficiently.
15
-
16
- ## Research Foundation
17
-
18
- ### Primary Citation
19
- > "We found eight types of credibility features: design look, structure/navigation, information focus, company recognition, security policies, physical address/contact, advertising policy, and personalization. Users evaluate these signals to determine trustworthiness, with professional design being the most cited factor."
20
- > -- Fogg, B.J. et al., 2003, p. 15-17
21
-
22
- **Full Citation (APA 7):**
23
- Fogg, B. J. (2003). *Persuasive technology: Using computers to change what we think and do*. Morgan Kaufmann Publishers. ISBN 978-1558606432
24
-
25
- **DOI**: N/A (Book) | Related paper: https://doi.org/10.1145/764008.763957
26
-
27
- ### Stanford Web Credibility Project
28
-
29
- > "The Stanford Guidelines for Web Credibility were derived from research involving over 4,500 participants. Results indicated that 46% of users assessed credibility based on design look and 28% on information structure/focus."
30
- > -- Fogg, B.J. et al., 2001, p. 63
31
-
32
- **Full Citation (APA 7):**
33
- Fogg, B. J., Soohoo, C., Danielson, D. R., Marable, L., Stanford, J., & Tauber, E. R. (2003). How do users evaluate the credibility of Web sites? A study with over 2,500 participants. *Proceedings of the 2003 Conference on Designing for User Experiences*, 1-15.
34
-
35
- **DOI**: https://doi.org/10.1145/997078.997097
36
-
37
- ### Key Numerical Values
38
-
39
- | Metric | Value | Source |
40
- |--------|-------|--------|
41
- | Credibility signal categories | 8 distinct types | Fogg (2003) |
42
- | Design-based trust judgments | 46% of evaluations | Stanford Web Credibility Project |
43
- | Time to form initial trust judgment | 50ms - 3 seconds | Lindgaard et al. (2006) |
44
- | Privacy policy reading rate | < 3% of users | McDonald & Cranor (2008) |
45
- | CTA hesitation (skeptical users) | 3-10x longer dwell time | Derived from eye-tracking studies |
46
-
47
- ### Eight Credibility Signals (Fogg, 2003)
48
-
49
- | Signal | Description | Detection Method |
50
- |--------|-------------|------------------|
51
- | `https` | Secure connection indicator | Protocol check |
52
- | `security_badge` | Trust seals, SSL badges, verification marks | Visual pattern matching |
53
- | `brand_recognition` | Known brand or company name | Brand database lookup |
54
- | `professional_design` | Polished visual design quality | Design quality heuristics |
55
- | `reviews_visible` | User reviews or testimonials | Review section detection |
56
- | `contact_info` | Physical address, phone number | Contact pattern matching |
57
- | `privacy_policy` | Privacy policy link presence | Footer/legal link detection |
58
- | `social_proof` | Social media presence, follower counts | Social element detection |
59
-
60
- ## Behavioral Levels
61
-
62
- | Value | Label | Behaviors |
63
- |-------|-------|-----------|
64
- | 0.0-0.2 | Very Skeptical | Scrutinizes every credibility signal; reads privacy policies and terms of service; 10x longer dwell time on CTAs involving data submission; checks URL bar repeatedly; hovers over links to verify destinations; refuses to proceed without HTTPS; abandons sites with any missing trust signals; searches for company reviews before transacting |
65
- | 0.2-0.4 | Skeptical | Checks for basic credibility signals (HTTPS, contact info); 3-5x longer deliberation before form submission; reads error messages and confirmations carefully; suspicious of too-good-to-be-true offers; examines checkout pages for security badges; may abandon if any signal feels "off" |
66
- | 0.4-0.6 | Moderate | Notices credibility signals but doesn't actively seek them; normal CTA click speed on established sites; slight hesitation on unfamiliar sites; proceeds if overall impression is professional; checks security for financial transactions only; baseline vigilance without excessive scrutiny |
67
- | 0.6-0.8 | Trusting | Clicks through CTAs without deliberation; assumes sites are legitimate unless obvious red flags; rarely reads terms or privacy policies; may ignore browser warnings about certificate issues; completes forms without hesitation; focuses on task completion over verification |
68
- | 0.8-1.0 | Very Trusting | Immediate CTA clicks; dismisses security warnings as false positives; provides personal information freely; may fall for phishing or dark patterns; clicks email links without verification; enters payment information on unfamiliar sites; assumes all sites are trustworthy by default |
69
-
70
- ## Trait Implementation in CBrowser
71
-
72
- ### Trust Signal Detection
73
-
74
- CBrowser detects and aggregates credibility signals:
75
-
76
- ```typescript
77
- interface TrustSignal {
78
- type: 'https' | 'security_badge' | 'brand_recognition' |
79
- 'professional_design' | 'reviews_visible' |
80
- 'contact_info' | 'privacy_policy' | 'social_proof';
81
- detected: boolean;
82
- strength: number; // 0-1 contribution to trust
83
- }
84
-
85
- function calculateSiteTrust(signals: TrustSignal[]): number {
86
- const weights = {
87
- https: 0.20,
88
- security_badge: 0.15,
89
- brand_recognition: 0.15,
90
- professional_design: 0.15,
91
- reviews_visible: 0.10,
92
- contact_info: 0.10,
93
- privacy_policy: 0.08,
94
- social_proof: 0.07
95
- };
96
-
97
- return signals.reduce((sum, s) =>
98
- sum + (s.detected ? weights[s.type] * s.strength : 0), 0);
99
- }
100
- ```
101
-
102
- ### CTA Deliberation Time
103
-
104
- ```typescript
105
- // Time multiplier before clicking sensitive CTAs
106
- function getCtaDeliberationMultiplier(
107
- trustCalibration: number,
108
- siteTrust: number,
109
- ctaSensitivity: 'low' | 'medium' | 'high'
110
- ): number {
111
- const sensitivityBase = { low: 1.0, medium: 2.0, high: 5.0 };
112
- const baseMultiplier = sensitivityBase[ctaSensitivity];
113
-
114
- // Skeptical users take much longer; trusting users barely pause
115
- const trustAdjustment = 1 + ((1 - trustCalibration) * (1 - siteTrust) * 10);
116
-
117
- return baseMultiplier * trustAdjustment;
118
- // Very skeptical on untrusted site: up to 10x delay
119
- // Very trusting: near 1x (no delay)
120
- }
121
- ```
122
-
123
- ### Trust State Tracking
124
-
125
- ```typescript
126
- interface TrustState {
127
- currentTrust: number; // Dynamic trust level for current site
128
- signalsDetected: TrustSignal[]; // Credibility signals found
129
- betrayalHistory: string[]; // Sites that violated trust
130
- verificationActions: number; // Count of verification behaviors
131
- }
132
-
133
- // Trust erosion after perceived betrayal
134
- function handleTrustBetrayal(state: TrustState, severity: number): void {
135
- state.currentTrust *= (1 - severity * 0.3); // 0-30% trust reduction
136
- state.betrayalHistory.push(currentDomain);
137
- // Betrayal history persists across sessions (learned distrust)
138
- }
139
- ```
140
-
141
- ## Estimated Trait Correlations
142
-
143
- > *Correlation estimates are derived from related research findings and theoretical models. Empirical calibration is planned ([GitHub #95](https://github.com/alexandriashai/cbrowser/issues/95)).*
144
-
145
- Research and theoretical models indicate the following correlations:
146
-
147
- | Related Trait | Correlation | Research Basis |
148
- |--------------|-------------|----------------|
149
- | Risk Tolerance | r = 0.45 | Trusting users take more risks with unknown sites |
150
- | Reading Tendency | r = -0.35 | Skeptical users read more content |
151
- | Patience | r = 0.28 | Verification takes time; skeptics invest it |
152
- | Comprehension | r = 0.18 | Weak correlation; trust is more emotional than cognitive |
153
- | Self-Efficacy | r = 0.22 | Some relationship; confident users may trust more |
154
-
155
- ### Interaction Effects
156
-
157
- - **Trust Calibration x Risk Tolerance**: Combined high values create users vulnerable to scams
158
- - **Trust Calibration x Reading Tendency**: Low trust + high reading = policy-reading skeptics
159
- - **Trust Calibration x Patience**: Low trust + low patience = users who abandon rather than verify
160
-
161
- ## Persona Values
162
-
163
- | Persona | Trust Calibration Value | Rationale |
164
- |---------|------------------------|-----------|
165
- | power-user | 0.55 | Moderate; aware of risks but efficient |
166
- | first-timer | 0.65 | Naive trust; hasn't learned skepticism yet |
167
- | elderly-user | 0.60 | Variable; may be trusting or overly cautious |
168
- | impatient-user | 0.70 | Trusts to save time; doesn't verify |
169
- | mobile-user | 0.55 | Moderate awareness of mobile security |
170
- | screen-reader-user | 0.50 | Cannot assess visual credibility signals |
171
- | anxious-user | 0.30 | Anxiety drives verification behaviors |
172
- | skeptical-user | 0.20 | Defining characteristic of persona |
173
-
174
- ## UX Design Implications
175
-
176
- ### For Low Trust Users (< 0.4)
177
-
178
- 1. **Prominent security indicators**: Display HTTPS lock, trust seals visibly
179
- 2. **Contact information**: Show physical address, phone, multiple contact methods
180
- 3. **Progressive disclosure**: Don't ask for sensitive data upfront
181
- 4. **Transparent policies**: Link to privacy policy, terms near data collection
182
- 5. **Third-party validation**: Display BBB ratings, industry certifications
183
- 6. **Testimonials with verification**: Real names, photos, verifiable reviews
184
-
185
- ### For High Trust Users (> 0.7)
186
-
187
- 1. **Streamlined flows**: Remove unnecessary verification steps
188
- 2. **Trust but protect**: Implement backend protections since user won't verify
189
- 3. **Explicit warnings**: Make important warnings unmissable since users dismiss easily
190
- 4. **Confirmation steps**: Force review of sensitive submissions even if users want to skip
191
- 5. **Dark pattern immunity**: These users are vulnerable; design ethically
192
-
193
- ### Trust Signal Placement Best Practices
194
-
195
- | Signal Type | Optimal Placement | Impact on Skeptical Users |
196
- |-------------|-------------------|--------------------------|
197
- | HTTPS/Lock | URL bar (browser) + visual indicator | Critical; first thing checked |
198
- | Security badges | Near form submission buttons | Reduces CTA hesitation by 30-50% |
199
- | Contact info | Footer + dedicated contact page | Increases completion of sensitive forms |
200
- | Reviews | Product pages, checkout | Reduces cart abandonment |
201
- | Privacy policy | Footer link + inline near data fields | Builds trust through transparency |
202
-
203
- ## See Also
204
-
205
- - [Trait-RiskTolerance](./Trait-RiskTolerance.md) - Willingness to take chances (related but distinct)
206
- - [Trait-ReadingTendency](./Trait-ReadingTendency.md) - Tendency to read content (skeptics read more)
207
- - [Trait-Patience](./Trait-Patience.md) - Time tolerance for verification
208
- - [Trait-SelfEfficacy](./Trait-SelfEfficacy.md) - Confidence may relate to trust
209
- - [Trait-Index](./Trait-Index.md) - Complete trait listing
210
-
211
- ## Bibliography
212
-
213
- Corritore, C. L., Kracher, B., & Wiedenbeck, S. (2003). On-line trust: Concepts, evolving themes, a model. *International Journal of Human-Computer Studies*, 58(6), 737-758. https://doi.org/10.1016/S1071-5819(03)00041-7
214
-
215
- Fogg, B. J. (2003). *Persuasive technology: Using computers to change what we think and do*. Morgan Kaufmann Publishers.
216
-
217
- Fogg, B. J., Soohoo, C., Danielson, D. R., Marable, L., Stanford, J., & Tauber, E. R. (2003). How do users evaluate the credibility of Web sites? A study with over 2,500 participants. *Proceedings of the 2003 Conference on Designing for User Experiences*, 1-15. https://doi.org/10.1145/997078.997097
218
-
219
- Lindgaard, G., Fernandes, G., Dudek, C., & Brown, J. (2006). Attention web designers: You have 50 milliseconds to make a good first impression! *Behaviour & Information Technology*, 25(2), 115-126. https://doi.org/10.1080/01449290500330448
220
-
221
- McDonald, A. M., & Cranor, L. F. (2008). The cost of reading privacy policies. *I/S: A Journal of Law and Policy for the Information Society*, 4(3), 543-568.
222
-
223
- McKnight, D. H., Choudhury, V., & Kacmar, C. (2002). Developing and validating trust measures for e-commerce: An integrative typology. *Information Systems Research*, 13(3), 334-359. https://doi.org/10.1287/isre.13.3.334.81
224
-
225
- Riegelsberger, J., Sasse, M. A., & McCarthy, J. D. (2005). The mechanics of trust: A framework for research and design. *International Journal of Human-Computer Studies*, 62(3), 381-422. https://doi.org/10.1016/j.ijhcs.2005.01.001
226
-
227
- Wang, Y. D., & Emurian, H. H. (2005). An overview of online trust: Concepts, elements, and implications. *Computers in Human Behavior*, 21(1), 105-125. https://doi.org/10.1016/j.chb.2003.11.008
@@ -1,192 +0,0 @@
1
- > **This documentation is no longer maintained here.**
2
- >
3
- > For the latest version, please visit: **[Working Memory](https://cbrowser.ai/docs/Trait-WorkingMemory)**
4
-
5
- ---
6
-
7
- # Working Memory
8
-
9
- **Category**: Tier 1 - Core Traits
10
- **Scale**: 0.0 (very limited capacity) to 1.0 (very high capacity)
11
-
12
- ## Definition
13
-
14
- Working memory represents a user's capacity to hold and manipulate information during task completion. This trait determines how many interface elements, form fields, navigation steps, and instructions a user can simultaneously track. Users with low working memory become overwhelmed by complex interfaces and forget earlier steps in multi-part processes, while those with high working memory can handle complex dashboards, long forms, and intricate navigation structures.
15
-
16
- ## Research Foundation
17
-
18
- ### Primary Citation
19
-
20
- > "The span of immediate memory imposes severe limitations on the amount of information that we are able to receive, process, and remember. By organizing the stimulus input simultaneously into several dimensions and successively into a sequence of chunks, we manage to break (or at least stretch) this informational bottleneck."
21
- > - Miller, 1956, p. 95
22
-
23
- **Full Citation (APA 7):**
24
- Miller, G. A. (1956). The magical number seven, plus or minus two: Some limits on our capacity for processing information. *Psychological Review*, 63(2), 81-97. https://doi.org/10.1037/h0043158
25
-
26
- **DOI**: https://doi.org/10.1037/h0043158
27
-
28
- ### Supporting Research
29
-
30
- > "Working memory capacity varies substantially across individuals and predicts performance on complex cognitive tasks, including reading comprehension, reasoning, and multitasking."
31
- > - Cowan, 2001, p. 89
32
-
33
- **Full Citation (APA 7):**
34
- Cowan, N. (2001). The magical number 4 in short-term memory: A reconsideration of mental storage capacity. *Behavioral and Brain Sciences*, 24(1), 87-114. https://doi.org/10.1017/S0140525X01003922
35
-
36
- ### Key Numerical Values
37
-
38
- | Metric | Value | Source |
39
- |--------|-------|--------|
40
- | Average chunk capacity | 7 plus or minus 2 (5-9 chunks) | Miller (1956) |
41
- | Cowan's revised estimate | 4 chunks (without rehearsal) | Cowan (2001) |
42
- | Duration without rehearsal | 15-30 seconds | Peterson & Peterson (1959) |
43
- | Optimal menu item count | 7 plus or minus 2 | Miller (1956) |
44
- | Form field cognitive load limit | 5-7 visible fields | UX research synthesis |
45
- | Information decay rate | 18-20% per 3 seconds | Atkinson & Shiffrin (1968) |
46
-
47
- ## Miller's Chunking Theory
48
-
49
- ### The Chunking Mechanism
50
-
51
- Miller discovered that while raw information capacity is limited, we can increase effective capacity through "chunking" - grouping related items into meaningful units.
52
-
53
- | Raw Items | Without Chunking | With Chunking |
54
- |-----------|------------------|---------------|
55
- | Phone number: 1-8-0-0-5-5-5-1-2-3-4 | 11 items (overload) | 3 chunks: 1-800 / 555 / 1234 |
56
- | Credit card: 4111111111111111 | 16 items (impossible) | 4 chunks: 4111 / 1111 / 1111 / 1111 |
57
-
58
- ### Interface Design Implications
59
-
60
- - Group related form fields visually
61
- - Limit navigation menus to 7 plus or minus 2 items
62
- - Use progressive disclosure to manage complexity
63
- - Provide breadcrumbs as external memory aids
64
-
65
- ## Behavioral Levels
66
-
67
- | Value | Label | Behaviors |
68
- |-------|-------|-----------|
69
- | 0.0-0.2 | Very Limited | Overwhelmed by more than 3-4 elements. Cannot complete multi-step forms. Forgets early steps in processes. Needs external memory aids for everything. Cannot compare more than 2 options. Loses place constantly in long pages. Cannot follow multi-part instructions. |
70
- | 0.2-0.4 | Limited | Handles 4-5 chunks maximum. Struggles with complex navigation. Needs visible step indicators. Forgets password requirements while typing. Can compare 2-3 options with difficulty. Benefits significantly from progress indicators. |
71
- | 0.4-0.6 | Moderate | Standard 7 plus or minus 2 capacity. Handles typical web interfaces. Can complete standard multi-step processes. Compares 3-4 options effectively. Follows breadcrumb navigation. May need to re-read instructions for complex tasks. |
72
- | 0.6-0.8 | High | Handles 8-10 chunks comfortably. Manages complex dashboards. Tracks multiple open tasks. Compares 5+ options mentally. Remembers earlier form inputs while completing later sections. Navigates complex hierarchies. |
73
- | 0.8-1.0 | Very High | Handles 10+ chunks. Power-user of complex interfaces. Tracks multiple simultaneous processes. Mentally holds entire site structure. Rarely needs visual aids for memory. Can complete complex forms from memory. |
74
-
75
- ## Estimated Trait Correlations
76
-
77
- > *Correlation estimates are derived from related research findings and theoretical models. Empirical calibration is planned ([GitHub #95](https://github.com/alexandriashai/cbrowser/issues/95)).*
78
-
79
- | Related Trait | Correlation | Mechanism |
80
- |---------------|-------------|-----------|
81
- | [Comprehension](./Trait-Comprehension.md) | r = 0.52 | Memory capacity enables complex understanding |
82
- | [Procedural Fluency](../traits/Trait-ProceduralFluency) | r = 0.45 | Procedure execution requires memory |
83
- | [Metacognitive Planning](../traits/Trait-MetacognitivePlanning) | r = 0.48 | Planning requires holding multiple options |
84
- | [Curiosity](./Trait-Curiosity.md) | r = 0.28 | Limited memory restricts exploration |
85
- | [Interrupt Recovery](../traits/Trait-InterruptRecovery) | r = 0.41 | Memory enables task resumption |
86
-
87
- ## Impact on Web Behavior
88
-
89
- ### Form Completion
90
-
91
- | WM Capacity | Max Fields Visible | Multi-Page Tolerance | Error Recall |
92
- |-------------|-------------------|---------------------|--------------|
93
- | Very Low | 3-4 | 2 pages max | Forgets immediately |
94
- | Low | 4-5 | 3 pages | Forgets quickly |
95
- | Moderate | 5-7 | 4-5 pages | Recalls with cues |
96
- | High | 7-9 | 6-8 pages | Good recall |
97
- | Very High | 9+ | 10+ pages | Excellent recall |
98
-
99
- ### Navigation Complexity
100
-
101
- ```
102
- Very Low: Can handle 3 levels deep maximum, needs breadcrumbs
103
- Low: 4 levels with visual aids
104
- Moderate: 5-6 levels with occasional disorientation
105
- High: 7+ levels, rarely gets lost
106
- Very High: Unlimited depth, builds mental maps easily
107
- ```
108
-
109
- ### Multi-tab/Window Behavior
110
-
111
- - **Low working memory**: Loses track of tabs, forgets why opened tab, closes wrong tabs
112
- - **High working memory**: Manages 10+ tabs efficiently, remembers purpose of each
113
-
114
- ### Comparison Tasks
115
-
116
- | WM Capacity | Products Compared | Needs Comparison Table |
117
- |-------------|-------------------|------------------------|
118
- | Very Low | 2 max | Yes, always |
119
- | Low | 2-3 | Yes |
120
- | Moderate | 3-4 | Helpful |
121
- | High | 4-5 | Optional |
122
- | Very High | 6+ | No |
123
-
124
- ## Cognitive Load Theory
125
-
126
- Sweller's Cognitive Load Theory (1988) extends Miller's work:
127
-
128
- ### Three Types of Load
129
-
130
- 1. **Intrinsic Load**: Inherent complexity of the material
131
- 2. **Extraneous Load**: Unnecessary complexity from poor design
132
- 3. **Germane Load**: Productive effort toward learning
133
-
134
- ### Working Memory Implications
135
-
136
- | WM Capacity | Total Load Tolerance | Extraneous Load Sensitivity |
137
- |-------------|---------------------|----------------------------|
138
- | Low | Very limited | Very sensitive |
139
- | Moderate | Standard | Moderately sensitive |
140
- | High | Expanded | Less sensitive |
141
-
142
- ## Persona Values
143
-
144
- | Persona | Working Memory Value | Rationale |
145
- |---------|----------------------|-----------|
146
- | [Distracted Parent](../personas/Persona-DistractedParent) | 0.35 | Divided attention reduces available WM |
147
- | [Anxious First-Timer](../personas/Persona-AnxiousFirstTimer) | 0.4 | Anxiety consumes WM capacity |
148
- | [Methodical Senior](../personas/Persona-MethodicalSenior) | 0.45 | Age-related decline, compensated by strategy |
149
- | [Rushed Professional](../personas/Persona-RushedProfessional) | 0.55 | Distraction reduces available capacity |
150
- | [Tech-Savvy Explorer](../personas/Persona-TechSavvyExplorer) | 0.75 | Practice and familiarity increase effective capacity |
151
- | [Power User](../personas/Persona-PowerUser) | 0.85 | High baseline plus extensive chunking |
152
-
153
- ## UX Design Implications
154
-
155
- ### For Low-Working-Memory Users
156
-
157
- - Limit visible form fields to 3-4 at a time
158
- - Use progressive disclosure aggressively
159
- - Provide breadcrumbs and step indicators
160
- - Group related information visually
161
- - Avoid requiring users to remember info across pages
162
- - Use inline validation (immediate feedback)
163
- - Provide "save and continue" functionality
164
- - Format numbers in chunks (555-1234, not 5551234)
165
-
166
- ### For High-Working-Memory Users
167
-
168
- - Can show more information density
169
- - Complex dashboards are navigable
170
- - Less need for progressive disclosure
171
- - Power-user features are accessible
172
- - Can handle comparison tables with many columns
173
-
174
- ## See Also
175
-
176
- - [Trait Index](./Trait-Index.md) - All cognitive traits
177
- - [Comprehension](./Trait-Comprehension.md) - Uses working memory capacity
178
- - [Procedural Fluency](../traits/Trait-ProceduralFluency) - Memory for procedures
179
- - [Interrupt Recovery](../traits/Trait-InterruptRecovery) - Task state in memory
180
- - [Persona Index](../personas/Persona-Index.md) - Pre-configured personas
181
-
182
- ## Bibliography
183
-
184
- Atkinson, R. C., & Shiffrin, R. M. (1968). Human memory: A proposed system and its control processes. In K. W. Spence & J. T. Spence (Eds.), *The Psychology of Learning and Motivation* (Vol. 2, pp. 89-195). Academic Press.
185
-
186
- Cowan, N. (2001). The magical number 4 in short-term memory: A reconsideration of mental storage capacity. *Behavioral and Brain Sciences*, 24(1), 87-114. https://doi.org/10.1017/S0140525X01003922
187
-
188
- Miller, G. A. (1956). The magical number seven, plus or minus two: Some limits on our capacity for processing information. *Psychological Review*, 63(2), 81-97. https://doi.org/10.1037/h0043158
189
-
190
- Peterson, L. R., & Peterson, M. J. (1959). Short-term retention of individual verbal items. *Journal of Experimental Psychology*, 58(3), 193-198. https://doi.org/10.1037/h0049234
191
-
192
- Sweller, J. (1988). Cognitive load during problem solving: Effects on learning. *Cognitive Science*, 12(2), 257-285. https://doi.org/10.1207/s15516709cog1202_4