Appendix D: FallacyTag Variability Model

Table of Contents

This appendix presents a structured view of the FallacyTag architecture as a product line architecture (PLA), capturing its key variation points, available options, and constraints. It supports implementers in identifying viable configurations and understanding architectural trade-offs.

đź”§ Variation Points Summary Table

Variation Point Options Constraints Notes
Privacy Handling (Privacy ↔ Observability) Local-only, Session-based, Identity-linked Must preserve user autonomy; no profiling; minimal friction Options vary in how much data persists and travels: “local-only” retains nothing, “identity-linked” enables long-term telemetry, requiring strong safeguards.
Inference Type (Statelessness ↔ Adaptivity) Prompt-only, Session-adaptive, Fine-tuned w/ memory Must preserve auditability and avoid unpredictable drift “Prompt-only” provides maximal transparency. “Fine-tuned” risks subtle shifts. Session-adaptive sits in between, retaining state temporarily.
Tag Strategy (Interpretability ↔ Expressive Power) Symbolic (sentence-level), Discourse-aware, Learned patterns Must maintain interpretability; minimize hallucination “Symbolic” uses explicit templates and rule-based mappings. “Learned patterns” are more flexible but harder to explain.
UI Integration (Separation ↔ Intrusion) Post-hoc Review, Inline Overlay, Export-Only Must preserve primary experience flow; avoid disruptive or adversarial UX “Post-hoc” works best in slower or asynchronous modes; “inline” suits text; “export-only” fits detached workflows like podcasts.
Feedback Use None, Aggregate Telemetry, User-linked Adaptation Feedback must not affect inference by default; linkage to identity must be explicitly authorized Intersects both privacy and adaptivity: feedback pipelines can erode statelessness and compromise anonymity. Aggregate telemetry enables improvement without retraining or profiling.
Downstream Use (Reflection ↔ Enforcement Drift) Reflective tagging, Optional annotations, Scoring/moderation Must avoid authoritative or punitive use; system intent must remain transparent Tags may be reused for judgment or ranking downstream, even if designed for reflection. Implementers must guard against misinterpretation of system posture.

đź§­ Feature Hierarchy Diagram

Feature hierarchy diagram

📌 Usage

This model provides implementers and researchers with a structured way to reason about system variants. It complements the prose discussion in Section 6.2 and is suitable for:

  • Evaluating architectural fit for a target domain (e.g., public discourse vs. classrooms)
  • Documenting design decisions and their implications
  • Supporting modular implementation planning

Future work may include mapping these features to implementation modules or tracing variation point dependencies.