{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T02:07:40Z","timestamp":1777342060312,"version":"3.51.4"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030777494","type":"print"},{"value":"9783030777500","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-77750-0_10","type":"book-chapter","created":{"date-parts":[[2021,7,2]],"date-time":"2021-07-02T23:04:56Z","timestamp":1625267096000},"page":"143-155","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["Dark Patterns in Online Shopping: of\u00a0Sneaky Tricks, Perceived Annoyance and\u00a0Respective Brand Trust"],"prefix":"10.1007","author":[{"given":"Christian","family":"Voigt","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7469-4381","authenticated-orcid":false,"given":"Stephan","family":"Schl\u00f6gl","sequence":"additional","affiliation":[]},{"given":"Aleksander","family":"Groth","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,3]]},"reference":[{"key":"10_CR1","volume-title":"A Pattern Language: Towns, Buildings, Construction","author":"C Alexander","year":"1977","unstructured":"Alexander, C.: A Pattern Language: Towns, Buildings, Construction. Oxford University Press, Oxford (1977)"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"B\u00f6sch, C., Erb, B., Kargl, F., Kopp, H., Pfattheicher, S.: Tales from the dark side: Privacy dark strategies and privacy dark patterns. In: Proceedings on Privacy Enhancing Technologies, vol. 2016, no. 4, pp. 237\u2013254 (2016)","DOI":"10.1515\/popets-2016-0038"},{"key":"10_CR3","unstructured":"Chromik, M., Eiband, M., V\u00f6lkel, S.T., Buschek, D.: Dark patterns of explainability, transparency, and user control for intelligent systems. In: IUI Workshops, vol. 2327 (2019)"},{"issue":"1","key":"10_CR4","first-page":"35","volume":"45","author":"E Delgado-Ballester","year":"2003","unstructured":"Delgado-Ballester, E., Munuera-Aleman, J.L., Yague-Guillen, M.J.: Development and validation of a brand trust scale. Int. J. Mark. Res. 45(1), 35\u201354 (2003)","journal-title":"Int. J. Mark. Res."},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Di Geronimo, L., Braz, L., Fregnan, E., Palomba, F., Bacchelli, A.: UI dark patterns and where to find them: a study on mobile applications and user perception. In: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, pp. 1\u201314 (2020)","DOI":"10.1145\/3313831.3376600"},{"issue":"6","key":"10_CR6","doi-asserted-by":"publisher","first-page":"456","DOI":"10.1080\/10447318.2018.1456150","volume":"35","author":"T Franke","year":"2019","unstructured":"Franke, T., Attig, C., Wessel, D.: A personal resource for technology interaction: development and validation of the affinity for technology interaction (ATI) scale. Int. J. Human-Comput. Interact. 35(6), 456\u2013467 (2019)","journal-title":"Int. J. Human-Comput. Interact."},{"issue":"6","key":"10_CR7","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1145\/242485.242493","volume":"3","author":"B Friedman","year":"1996","unstructured":"Friedman, B.: Value-sensitive design. Interactions 3(6), 16\u201323 (1996)","journal-title":"Interactions"},{"key":"10_CR8","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/7585.001.0001","volume-title":"Value Sensitive Design: Shaping Technology with Moral Imagination","author":"B Friedman","year":"2019","unstructured":"Friedman, B., Hendry, D.G.: Value Sensitive Design: Shaping Technology with Moral Imagination. MIT Press, Cambridge (2019)"},{"key":"10_CR9","volume-title":"Design Patterns: Elements of Reusable Object-oriented Software","author":"E Gamma","year":"1995","unstructured":"Gamma, E.: Design Patterns: Elements of Reusable Object-oriented Software. Pearson Education India, Chennai (1995)"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Gray, C.M., Kou, Y., Battles, B., Hoggatt, J., Toombs, A.L.: The dark (patterns) side of UX design. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1\u201314 (2018)","DOI":"10.1145\/3173574.3174108"},{"key":"10_CR11","unstructured":"Jones, V., Jo, J., Martin, P.: Future schools and how technology can be used to support millennial and generation-z students. In: ICUT 2007 (Proc. B), 1st International Conference on Ubiquitous Information Technology, pp. 886\u2013891. Citeseer (2007)"},{"key":"10_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4302-6422-4","volume-title":"Irresistible Apps: Motivational Design Patterns for Apps, Games, and Web-Based Communities","author":"C Lewis","year":"2014","unstructured":"Lewis, C.: Irresistible Apps: Motivational Design Patterns for Apps, Games, and Web-Based Communities. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-1-4302-6422-4"},{"key":"10_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/978-3-030-33752-0_6","volume-title":"Heterogeneous Data Management, Polystores, and Analytics for Healthcare","author":"J Mohan","year":"2019","unstructured":"Mohan, J., Wasserman, M., Chidambaram, V.: Analyzing GDPR compliance through the lens of privacy policy. In: Gadepally, V., et al. (eds.) DMAH\/Poly -2019. LNCS, vol. 11721, pp. 82\u201395. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-33752-0_6"},{"issue":"2","key":"10_CR14","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1145\/3400899.3400901","volume":"18","author":"A Narayanan","year":"2020","unstructured":"Narayanan, A., Mathur, A., Chetty, M., Kshirsagar, M.: Dark patterns: past, present, and future. Queue 18(2), 67\u201392 (2020)","journal-title":"Queue"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Nouwens, M., Liccardi, I., Veale, M., Karger, D., Kagal, L.: Dark patterns after the GDPR: scraping consent pop-ups and demonstrating their influence. In: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, pp. 1\u201313 (2020)","DOI":"10.1145\/3313831.3376321"},{"issue":"5","key":"10_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1108\/10748120110424816","volume":"9","author":"M Prensky","year":"2001","unstructured":"Prensky, M.: Digital natives, digital immigrants part 1. Horizon 9(5), 1\u20136 (2001). https:\/\/doi.org\/10.1108\/10748120110424816","journal-title":"Horizon"},{"issue":"3","key":"10_CR17","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1177\/0162243912436985","volume":"38","author":"K Shilton","year":"2013","unstructured":"Shilton, K.: Values levers: building ethics into design. Sci. Technol. Human Values 38(3), 374\u2013397 (2013)","journal-title":"Sci. Technol. Human Values"},{"key":"10_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79870-5","volume-title":"The Art and Science of Interface and Interaction Design (Vol. 1)","author":"C Sommerer","year":"2008","unstructured":"Sommerer, C., Mignonneau, L.: The Art and Science of Interface and Interaction Design (Vol. 1), vol. 141. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-79870-5"},{"key":"10_CR19","unstructured":"European Union: Regulation (EU) no 2016\/679 of the European parliament and of the council n the protection of natural persons with regard to the processing of personal data and on the free movement of such data (general data protection regulation \u2013 GDPR). OJ (2018)"}],"container-title":["Lecture Notes in Computer Science","HCI in Business, Government and Organizations"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-77750-0_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T22:13:01Z","timestamp":1751494381000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-77750-0_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030777494","9783030777500"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-77750-0_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"3 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 July 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 July 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2021.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}