Unclick

Last updated
A web page menu showing which preferences are in effect. By using a mouse or graphical pointer, a user can move a cursor over selected terms, and un-check or unclick them, if the software permits it. Hotel booking checkbox example.png
A web page menu showing which preferences are in effect. By using a mouse or graphical pointer, a user can move a cursor over selected terms, and un-check or unclick them, if the software permits it.
A checkbox is a graphical user interface element in which a computer user can make multiple selections from an array of options. Checkbox States.svg
A checkbox is a graphical user interface element in which a computer user can make multiple selections from an array of options.
A user generally cannot unclick a radio button; one option must be selected. VirtualBox Windows Chicago 11 11 2023 10 43 00 radio buttons.png
A user generally cannot unclick a radio button; one option must be selected.

In computer interface design, to unclick is to deselect a specific preference, [2] [3] typically by tapping a selected checkbox with a finger or cursor. As a result, the check mark image or dark circle inside the box is removed.

Contents

Background

As the Internet becomes an increasingly popular medium for marketers, vendors and marketers often presume that a user will prefer certain choices, [4] [5] such as receiving emails in the future, having specific computer settings, or preferring that specific programs will be operational when a computer is turned on. As a result, it is sometimes necessary for a user to unclick these choices [6] to avoid exposure to unwanted advertising, [7] or to avoid a situation in which a different website is chosen for one's home page. [8]

In Internet marketing, unclicking is often required for a user to avoid being billed automatically for unnecessary services, sometimes part of a deceptive business practice termed negative option billing. A user's Facebook privacy settings have often been chosen in advance by Facebook Inc., which presumes that a user would like particular settings, and to un-choose these options, a user may need to unclick or opt-out of the Facebook-determined choices by finding the right menus. [9] According to behavioral economics, computer and Internet users have a general tendency to go along with a default setting.

Other contexts

The term unclick has also been used in other contexts, such as when there is a latching or locking mechanism, such as a lock on a briefcase, [10] or seat belts in a car [11] [12] or airplane, [13] or door lock, [14] or other mechanisms which typically make a "clicking" sound. In these contexts, unclicking means to open the latch or seat belt. It has also been used in the context of guns, in which a safety catch is "unclicked", [15] or flooring materials in which pieces are interlocked, [16] The term has been used to describe the act of answering a cell phone by pressing on a button when it is ringing. [17]

Related Research Articles

<span class="mw-page-title-main">Privacy</span> Seclusion from unwanted attention

Privacy is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively.

<span class="mw-page-title-main">Digital media</span> Any media that are encoded in machine-readable formats

In mass communication, digital media is any communication media that operates in conjunction with various encoded machine-readable data formats. Digital content can be created, viewed, distributed, modified, listened to, and preserved on a digital electronic device, including digital data storage media and digital broadcasting. Digital is defined as any data represented by a series of digits, and media refers to methods of broadcasting or communicating this information. Together, digital media refers to mediums of digitized information broadcast through a screen and/or a speaker. This also includes text, audio, video, and graphics that are transmitted over the internet for viewing or listening to on the internet.

In economics, vendor lock-in, also known as proprietary lock-in or customer lock-in, makes a customer dependent on a vendor for products, unable to use another vendor without substantial switching costs.

<span class="mw-page-title-main">Internet forum</span> Online discussion site

An Internet forum, or message board, is an online discussion site where people can hold conversations in the form of posted messages. They differ from chat rooms in that messages are often longer than one line of text, and are at least temporarily archived. Also, depending on the access level of a user or the forum set-up, a posted message might need to be approved by a moderator before it becomes publicly visible.

Viral marketing is a business strategy that uses existing social networks to promote a product mainly on various social media platforms. Its name refers to how consumers spread information about a product with other people, much in the same way that a virus spreads from one person to another. It can be delivered by word of mouth, or enhanced by the network effects of the Internet and mobile networks.

Internet privacy involves the right or mandate of personal privacy concerning the storage, re-purposing, provision to third parties, and display of information pertaining to oneself via the Internet. Internet privacy is a subset of data privacy. Privacy concerns have been articulated from the beginnings of large-scale computer sharing and especially relate to mass surveillance.

Computer ethics is a part of practical philosophy concerned with how computing professionals should make decisions regarding professional and social conduct.

<span class="mw-page-title-main">Image macro</span> Piece of digital media featuring a picture or an artwork with text superimposed

An image macro is a piece of digital media featuring a picture, or artwork, with some form of text superimposed. The text frequently appears at the top and bottom of the image. Image macros were one of the most common forms of internet memes in the 2000s, and often featured witty messages or catchphrases, although not all image macros are necessarily humorous. LOLcats, which are images of expressive cats coupled with texts, are considered to be the first notable occurrence of image macros. Advice animal image macros, also referred to as stock-character macros, are also highly associated with the image macro template.

<span class="mw-page-title-main">Error message</span> Computer message indicating an error

An error message is the information displayed when an unforeseen problem occurs, usually on a computer or other device. Modern operating systems with graphical user interfaces, often display error messages using dialog boxes. Error messages are used when user intervention is required, to indicate that a desired operation has failed, or to relay important warnings. Error messages are seen widely throughout computing, and are part of every operating system or computer hardware device. The proper design of error messages is an important topic in usability and other fields of human–computer interaction.

<span class="mw-page-title-main">Social media</span> Virtual online communities

Social media are interactive technologies that facilitate the creation, sharing and aggregation of content, ideas, interests, and other forms of expression through virtual communities and networks. Social media refers to new forms of media that involve interactive participation. While challenges to the definition of social media arise due to the variety of stand-alone and built-in social media services currently available, there are some common features:

  1. Social media are interactive Web 2.0 Internet-based applications.
  2. User-generated content—such as text posts or comments, digital photos or videos, and data generated through all online interactions—is the lifeblood of social media.
  3. Users create service-specific profiles for the website or app that are designed and maintained by the social media organization.
  4. Social media helps the development of online social networks by connecting a user's profile with those of other individuals or groups.

Microblogging is a form of blogging using short posts without titles known as microposts. Microblogs "allow users to exchange small elements of content such as short sentences, individual images, or video links", which may be the major reason for their popularity. Some popular social networks such as Twitter, Mastodon, Tumblr, Koo, and Instagram can be viewed as collections of microblogs.

In computing and telecommunications, the payload is the part of transmitted data that is the actual intended message. Headers and metadata are sent only to enable payload delivery and are considered overhead.

<span class="mw-page-title-main">Targeted advertising</span> Form of advertising

Targeted advertising is a form of advertising, including online advertising, that is directed towards an audience with certain traits, based on the product or person the advertiser is promoting.

Proprietary software is software that grants its creator, publisher, or other rightsholder or rightsholder partner a legal monopoly by modern copyright and intellectual property law to exclude the recipient from freely sharing the software or modifying it, and—in some cases, as is the case with some patent-encumbered and EULA-bound software—from making use of the software on their own, thereby restricting their freedoms.

<span class="mw-page-title-main">Computer virus</span> Computer program that modifies other programs to replicate itself and spread

A computer virus is a type of malware that, when executed, replicates itself by modifying other computer programs and inserting its own code into those programs. If this replication succeeds, the affected areas are then said to be "infected" with a computer virus, a metaphor derived from biological viruses.

<span class="mw-page-title-main">Social media marketing</span> Promotion of products or services on social media

Social media marketing is the use of social media platforms and websites to promote a product or service. Although the terms e-marketing and digital marketing are still dominant in academia, social media marketing is becoming more popular for both practitioners and researchers. Most social media platforms have built-in data analytics tools, enabling companies to track the progress, success, and engagement of social media marketing campaigns. Companies address a range of stakeholders through social media marketing, including current and potential customers, current and potential employees, journalists, bloggers, and the general public. On a strategic level, social media marketing includes the management of a marketing campaign, governance, setting the scope and the establishment of a firm's desired social media "culture" and "tone".

Site retargeting is a display advertising technique used by marketers to display advertising to people who have previously visited their website. The marketer includes a pixel within their webpage which sets a cookie in the user's browser. That cookie allows the marketer to target the website visitor with advertising elsewhere on the internet using retargeting.

Since the arrival of early social networking sites in the early 2000s, online social networking platforms have expanded exponentially, with the biggest names in social media in the mid-2010s being Facebook, Instagram, Twitter and Snapchat. The massive influx of personal information that has become available online and stored in the cloud has put user privacy at the forefront of discussion regarding the database's ability to safely store such personal information. The extent to which users and social media platform administrators can access user profiles has become a new topic of ethical consideration, and the legality, awareness, and boundaries of subsequent privacy violations are critical concerns in advance of the technological age.

<span class="mw-page-title-main">Friendica</span> Free software for distributed social networks

Friendica is a free and open-source software distributed social network. It forms one part of the Fediverse, an interconnected and decentralized network of independently operated servers.

Privacy settings are "the part of a social networking website, internet browser, piece of software, etc. that allows you to control who sees information about you". With the growing prevalence of social networking services, opportunities for privacy exposures also grow. Privacy settings allow a person to control what information is shared on these platforms.

References

  1. Flanagan, David (2002). JavaScript: The Definitive Guide. "O'Reilly Media, Inc.". p. 638. ISBN   978-0-596-00048-6.
  2. James Coates (August 27, 2001). "Quickly make icons as pretty as a picture". Chicago Tribune. Retrieved 2012-01-07.
  3. TARA SIEGEL BERNARD (September 1, 2011). "MarketRiders Tweaks Its Investment Mix". The New York Times. Retrieved 2012-01-04.
  4. JASON FRY (March 31, 2008). "Thoughts on Kids and the Net: Readers Offer Thoughts on When Children Should Be Introduced to the Digital World". Wall Street Journal. Retrieved 2012-01-07.
  5. Lee Dembart (August 26, 2002). "the end user / A voice for the consumer : You, on radio". The New York Times. Retrieved 2012-01-07.
  6. North American Precis Syndicate NJ.com (January 4, 2010). "Steering Clear Of Deceptive Online Marketing". nj.com. Retrieved 2012-01-04.
  7. Brian Bergstein, AP Technology Editor (October 1, 2008). "How can I make my computer run faster, for free?". USA Today. Retrieved 2012-01-04.{{cite news}}: |author= has generic name (help)
  8. Rob Freeman (25 September 2007). "Click Tips: Making XP look like Vista". BBC News. Retrieved 2012-01-07.
  9. Shannon Montgomery, of The Canadian Press (July 2, 2010). "Lawsuit says Facebook changes sold as making info secure had opposite effect". The Star. Retrieved 2012-01-04.
  10. John Miller (December 1998). "Life Is Adventure: Postcards from Rio de Janeiro". Brazzil. Retrieved 2012-01-07.
  11. The Gazette (Montreal) (April 19, 2006). "FJ Cruiser makes landfall". Canada.com. Retrieved 2012-01-07.
  12. Cynthia Lee (October 14, 2011). "New Jersey car seat laws: Which seat is best for your child?". The Star-Ledger. Retrieved 2012-01-07.
  13. Ron Alexander (December 18, 1991). "Metropolitan Diary". The New York Times. Retrieved 2012-01-07.
  14. Burnaby Now (April 28, 2009). "If the shoe fits: Christmas came early for the trio of Sandra McLellan, Sarah Dadey and Jason McLellan". canada.com. Retrieved 2012-01-07.
  15. Arundhati Roy (26 March 2010). "Gandhi, but with guns: Part Five". The Guardian. Retrieved 2012-01-07.
  16. Adele Evans (October 14, 2001). "It's underfoot, but important: Floor: An upgrade can make a home distinctive, but choosing the right material and pattern doesn't come easy". Baltimore Sun. Retrieved 2012-01-07.
  17. Lynn Hirschberg (May 14, 2000). "The Samaha Formula for Hollywood Success". The New York Times. Retrieved 2012-01-07.