Skip to content

Instantly share code, notes, and snippets.

@meysam81
Created October 6, 2025 13:33
Show Gist options
  • Select an option

  • Save meysam81/1a71a4f33dd04a95ca008e8e9de00d4d to your computer and use it in GitHub Desktop.

Select an option

Save meysam81/1a71a4f33dd04a95ca008e8e9de00d4d to your computer and use it in GitHub Desktop.
Claude Sonnet 4.5 summary of Influence: The Psychology of Persuasion
# Influence: The Psychology of Persuasion - Robert Cialdini
## Core Premise
Humans use mental shortcuts (heuristics) to make decisions efficiently. These automatic response patterns can be exploited by “compliance practitioners” to trigger desired behaviors without conscious deliberation.
## The Six Principles of Influence
### 1. **Reciprocity**
- **Mechanism**: Humans feel obligated to repay debts, favors, gifts, and concessions
- **Why it works**: Evolutionary advantage for cooperation; social pressure against being labeled a “freeloader”
- **Key tactics**:
- **Uninvited debts**: Free samples, gifts before requests (Hare Krishna airport example)
- **Rejection-then-retreat**: Start with large request, retreat to desired smaller request (appears as concession, triggers reciprocal concession)
- **Defense**: Recognize genuine favors vs. compliance tricks; reject the initial favor mentally to eliminate obligation
### 2. **Commitment and Consistency**
- **Mechanism**: Once we make a choice/take a stand, we face personal and interpersonal pressure to behave consistently with that commitment
- **Why it works**: Consistency is valued socially; reduces cognitive effort; protects self-image
- **Key tactics**:
- **Foot-in-the-door**: Small initial commitment leads to larger ones
- **Written commitments**: Especially powerful (Chinese POW camps, contest entries)
- **Public commitments**: Harder to back out of
- **Effortful commitments**: The harder you work for something, the more you value it (harsh initiations increase group loyalty)
- **Inner choice**: When people believe they chose freely, commitment strengthens
- **Critical insight**: “Lowballing” - secure commitment, then change terms; people often proceed anyway
- **Defense**: Listen to internal discomfort (“stomach sign”); ask “Knowing what I know now, would I make the same choice?”
### 3. **Social Proof**
- **Mechanism**: We determine correct behavior by observing what others do, especially in uncertainty
- **Why it works**: Usually accurate heuristic; reduces decision-making burden
- **Key factors**:
- **Uncertainty amplifies**: More ambiguous the situation, stronger the effect
- **Similarity matters**: We follow people like us more than dissimilar others
- **Dark examples**:
- Bystander effect (Kitty Genovese) - pluralistic ignorance
- Mass suicides (Jonestown)
- Canned laughter, bartender tip jars seeded with bills
- Werther effect (copycat suicides)
- **Critical vulnerability**: “Pluralistic ignorance” - everyone looking to everyone else in emergencies, no one acting
- **Defense**: Be aware data may be falsified; recognize sabotage attempts; take personal responsibility in emergencies
### 4. **Liking**
- **Mechanism**: We prefer to say yes to people we like
- **Factors that increase liking**:
- **Physical attractiveness**: Halo effect - assume attractive people have other positive traits
- **Similarity**: We like people similar to us (opinions, background, interests, dress)
- **Compliments**: Even insincere flattery often works
- **Contact and cooperation**: Repeated exposure + working toward common goals
- **Conditioning and association**: We like people/things associated with positive experiences
- **Applications**: Tupperware parties (friend recommendation), car salespeople finding similarities, good cop/bad cop
- **Defense**: Separate feeling of liking from the merits of the deal; ask “Do I like this person more than I should under the circumstances?”
### 5. **Authority**
- **Mechanism**: Deep-seated duty to obey authority figures
- **Why it works**: Legitimate authorities often do know better; hierarchical systems function through obedience
- **Key evidence**: Milgram experiments - 65% delivered maximum shocks when ordered by authority
- **Symbols exploited**:
- **Titles**: Doctor, Professor, etc. (even fake ones work)
- **Clothing**: Uniforms, business suits
- **Trappings**: Expensive cars, office settings
- **Critical point**: We often obey symbols of authority without checking actual expertise or relevance
- **Defense**: Ask two questions - “Is this authority truly an expert?” and “How truthful can we expect the expert to be?”
### 6. **Scarcity**
- **Mechanism**: Opportunities appear more valuable when availability is limited
- **Why it works**: Psychological reactance - when freedom threatened, we want it more; scarcity often signals quality
- **Key applications**:
- **Limited number**: “Only 5 left”
- **Limited time**: Deadlines, “offer expires”
- **Competition**: “Others want this too”
- **Critical insight**: **Newly scarce** items are valued more than consistently scarce ones (revolutions occur when conditions improve then worsen, not at depths of oppression)
- **Strongest form**: Scarcity + competition (auction psychology, Romeo and Juliet effect)
- **Defense**: Recognize arousal from scarcity; ask “Do I want it for its utility or because it’s scarce?” Unless you’re a collector, scarcity is irrelevant
## Meta-Insights
**Automatic responding**: These principles trigger “click-whirr” responses - like animal fixed action patterns, humans respond automatically to triggers without thinking
**Perceptual contrast**: How we perceive things depends on what came before (used alongside other principles - e.g., expensive item first makes others seem cheap)
**Ethical use vs. exploitation**: Distinction between legitimately using principles and deceiving people with false triggers (fake scarcity, manufactured authority)
**Defense strategy**: Recognize when principles are being used fairly vs. exploitatively; you’re only obligated to respond when triggers are genuine
**Cognitive misers**: We can’t analyze everything deeply, so these shortcuts are necessary - the key is recognizing when they’re being manipulated
The book’s underlying warning: As information overload increases, we rely more on these heuristics, making us more vulnerable to exploitation by those who understand these principles.​​​​​​​​​​​​​​​​
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment