Tier 4

pinf - Persuasion & Influence Analysis

Persuasion & Influence Analysis

Input: $ARGUMENTS


Step 1: Identify the Influence Dynamics

Map who is influencing whom in the situation.

  1. Who are the actors? (people, organizations, groups)
  2. For each pair of actors, is there an influence relationship?
  3. What is the direction? (A influences B, mutual, or indirect through C)
  4. What is at stake? (what decision, behavior, or belief is being influenced)
ACTORS:
1. [actor A] — Role: [influencer / target / both]
2. [actor B] — Role: [influencer / target / both]
...

INFLUENCE MAP:
- [A] -> [B]: [what A is trying to get B to do/believe]
- [B] -> [A]: [what B is trying to get A to do/believe] (if mutual)
...

STAKES: [what is ultimately being decided or changed]

Step 2: Map the Influence Channels

For each influence relationship, identify which channels are active. Based on Cialdini’s principles plus additional channels:

Core Channels

ChannelMechanismSignal
AuthorityDeference to expertise or positionTitles, credentials, uniforms, confident tone
ReciprocityObligation from receiving somethingGifts, favors, concessions, free samples
Social proofFollowing what others doTestimonials, popularity metrics, “everyone’s doing it”
ScarcityUrgency from limited availabilityDeadlines, “only 3 left,” exclusive access
LikingPersuaded by those we likeFlattery, similarity, attractiveness, rapport
ConsistencyDesire to align with past commitments”You said before…”, foot-in-the-door, public pledges

Additional Channels

ChannelMechanismSignal
FramingShaping how options are perceivedAnchoring, loss vs. gain framing, default options
Information controlControlling what is knownSelective disclosure, timing of release, complexity
Emotional leverageUsing emotions to override reasoningFear, guilt, excitement, outrage
Structural powerInfluence through position/accessGatekeeping, agenda setting, resource control
NarrativeEmbedding influence in storiesOrigin stories, cautionary tales, identity narratives
ACTIVE CHANNELS:
- [A] -> [B] via [channel]: [specific example from the situation]
- [A] -> [B] via [channel]: [specific example from the situation]
...

DOMINANT CHANNEL: [which channel carries the most influence]

Step 3: Assess Channel Effectiveness

For each active channel, rate how well it’s working:

CHANNEL ASSESSMENT:
1. [channel] — Effectiveness: [HIGH / MODERATE / LOW]
   Why: [what makes it effective or ineffective in this context]
   Target awareness: [target knows / suspects / unaware]

2. [channel] — Effectiveness: [HIGH / MODERATE / LOW]
   ...

Key factors that affect effectiveness:

  • Target awareness: Known influence is weaker (except authority)
  • Channel match: Does the channel fit the target’s psychology?
  • Saturation: Overused channels lose power
  • Credibility: Is the channel authentic or manufactured?

Step 4: Identify Ethical Boundaries

Assess the ethical dimension of each influence attempt:

TestQuestion
TransparencyWould the influence still work if the target fully understood the tactic?
AutonomyIs the target free to say no without penalty?
TruthIs the information being presented accurate and complete?
BenefitDoes the outcome genuinely serve the target’s interests?
ReversibilityCan the target reverse the decision once the influence fades?
ETHICAL ASSESSMENT:
- [channel/tactic]: [ETHICAL / GRAY / MANIPULATIVE]
  Reasoning: [which tests pass and fail]
...

OVERALL: [ethical influence / mixed / manipulation]

Manipulation = influence that relies on the target NOT understanding what’s happening. Ethical persuasion works even when transparent.


Step 5: Recommend Strategy

Based on the analysis, provide recommendations. The recommendation depends on the user’s role:

If the user is the INFLUENCER:

RECOMMENDED STRATEGY:
1. Lead with: [most effective ethical channel]
2. Support with: [secondary channel]
3. Avoid: [channels that cross ethical lines or would backfire]
4. Key message: [the core persuasive message]
5. Timing: [when to make the attempt]

If the user is the TARGET:

DEFENSE STRATEGY:
1. Be aware of: [channels being used on you]
2. Counter [channel] by: [specific defense]
3. Create distance: [how to pause and evaluate independently]
4. Decision test: "Would I make this same choice if [influence] were removed?"
5. Seek: [independent information sources or advisors]

If the user is an OBSERVER:

OBSERVATION SUMMARY:
1. Primary influence dynamic: [what's happening]
2. Most powerful channel: [which and why]
3. Ethical assessment: [clean / concerning / manipulative]
4. Likely outcome if unchanged: [prediction]
5. Intervention point: [where the dynamic could be shifted]

Step 6: Predict Outcomes

Based on the influence analysis:

PREDICTIONS:
- If current dynamics continue: [likely outcome]
- If [recommended strategy] is applied: [likely outcome]
- Wildcard scenario: [unexpected shift that could change everything]

CONFIDENCE: [HIGH / MODERATE / LOW]
KEY VARIABLE: [the single factor most likely to determine the outcome]

Integration

Use with:

  • /per -> Design a persuasive communication based on this analysis
  • /aex -> Check whether your read of the influence dynamics is biased
  • /usrn -> Understand what the target actually needs (not just what they’re being pushed toward)
  • /spec -> Explore “what if” scenarios around influence outcomes