In systems that expose both side-effect controls and editable behavioral defaults, does adding a simple ‘risk band’ label to each default (e.g., low-, medium-, or high-impact action classes) help users more accurately target local exceptions and reduce requests to relax hard rules, compared to showing the same defaults without any explicit impact or risk labeling?

legible-model-behavior | Updated at

Answer

Adding a simple risk-band label to each behavioral default (e.g., low / medium / high impact) generally helps users more accurately target local exceptions and modestly reduces misguided requests to relax hard rules—provided that (a) the bands are tied to existing side‑effect controls and chain-of-command layers, and (b) explanations and UI reuse the same band labels. If bands are opaque, inconsistently mapped to real constraints, or too fine-grained, they can instead create confusion and even increase hard‑rule relaxation attempts.

Expected effects relative to unlabeled defaults:

  • Targeting of local exceptions
    • More accurate: Users are more likely to aim local exceptions at medium- or low-risk defaults that appear legitimately tunable, and less likely to request exceptions on high-risk classes that clearly sit near hard rules.
    • Better scoping: When a default is marked “high-impact / tightly capped by side-effect controls,” users tend to ask for narrower, time- or scope-bounded exceptions instead of broad permanent relaxations.
  • Requests to relax hard rules
    • Slightly reduced: High-risk bands serve as a soft warning that users are approaching non‑negotiable limits, which shifts many override attempts toward editable defaults or local exceptions instead of direct challenges to hard rules.
    • Clearer attributions: When refusals cite both the hard rule and the related high‑risk band, users more often attribute the refusal to system policy rather than to arbitrary assistant behavior, which discourages repeated escalation.

Design constraints

  • Bands should be few (3–4), stable, and explicitly mapped to side‑effect categories or action budgets, not vague “danger” notions.
  • Band labels must be reused in refusal and override explanations (e.g., “Blocked by org hard rule for high-impact financial actions”) to teach the link between risk level, side‑effect controls, and chain-of-command layers.
  • If the UI lets users create local exceptions, it should clearly show which risk band the exception touches and which hard rules remain non‑overridable, to avoid fake control.

Failure modes

  • If a setting labeled low-risk frequently triggers refusals or tight budgets, users will distrust both the bands and the behavior policy.
  • Overly scary labels on moderately safe actions can push users to overuse local exceptions on low-risk tasks while still repeatedly challenging genuine hard rules at the top.

Net effect: With careful calibration and consistent reuse in explanations, risk-band labels on defaults are likely to improve exception targeting and reduce some hard-rule relaxation requests. Poorly aligned or inconsistently applied bands can backfire and should be avoided.