{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T18:16:02Z","timestamp":1774894562312,"version":"3.50.1"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031376481","type":"print"},{"value":"9783031376498","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,7,25]],"date-time":"2023-07-25T00:00:00Z","timestamp":1690243200000},"content-version":"vor","delay-in-days":205,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>An HTTP cookie (hereinafter cookie) is a piece of information that maintains a state in a stateless HTTP protocol. Recently established privacy and security regulation imposes an obligation on the service provider to obtain the user\u2019s consent to use cookies. This paper is aimed at studying usability guidelines of requests for consent to use cookies (hereinafter consent requests). The consent requests have usability issues that make it difficult for the users to choose the right privacy and security options. A study of privacy and security regulation is aimed at extracting design requirements. Manipulative designs also known as dark patterns are explored and applied to assess consent requests of two of the most popular Lithuanian news portals. An evaluation revealed the presence of dark patterns in consent requests as well as violation of privacy and security requirements. As a result, usability guidelines on the design of cookie consent requests are developed.<\/jats:p>","DOI":"10.1007\/978-3-031-37649-8_19","type":"book-chapter","created":{"date-parts":[[2023,7,25]],"date-time":"2023-07-25T04:02:08Z","timestamp":1690257728000},"page":"191-201","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Improving the Usability of Requests for Consent to Use Cookies"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5375-7371","authenticated-orcid":false,"given":"Kristina","family":"Lapin","sequence":"first","affiliation":[]},{"given":"Laima","family":"Volungevi\u010di\u016bt\u0117","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,7,25]]},"reference":[{"key":"19_CR1","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1145\/502152.502153","volume":"1","author":"DM Kristol","year":"2001","unstructured":"Kristol, D.M.: HTTP Cookies: standards, privacy, and politics. ACM Trans. Internet Technol. 1, 151\u2013198 (2001). https:\/\/doi.org\/10.1145\/502152.502153","journal-title":"ACM Trans. Internet Technol."},{"key":"19_CR2","unstructured":"Using HTTP cookies \u2013 HTTP\u2014MDN. https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/HTTP\/Cookies. Accessed 28 Sept 2022"},{"key":"19_CR3","unstructured":"Koch, R.: Cookies, the GDPR, and the ePrivacy Directive. https:\/\/gdpr.eu\/cookies\/. Accessed 28 Sept 2022"},{"key":"19_CR4","doi-asserted-by":"publisher","unstructured":"Hamed, A., Kaffel-Ben Ayed, H., Kaafar, M.A., Kharraz, A.: Evaluation of third party tracking on the web. In: 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013), pp. 471\u2013477 (2013). https:\/\/doi.org\/10.1109\/ICITST.2013.6750244","DOI":"10.1109\/ICITST.2013.6750244"},{"key":"19_CR5","doi-asserted-by":"publisher","unstructured":"Nouwens, M., Liccardi, I., Veale, M., Karger, D., Kagal, L.: Dark patterns after the GDPR: scraping consent pop-ups and demonstrating their influence. In: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, pp. 1\u201313. Association for Computing Machinery, New York, NY, USA (2020). https:\/\/doi.org\/10.1145\/3313831.3376321","DOI":"10.1145\/3313831.3376321"},{"key":"19_CR6","unstructured":"Brignull, H.: Bringing Dark Patterns to Light. https:\/\/harrybr.medium.com\/bringing-dark-patterns-to-light-d86f24224ebf. Accessed 28 Sept 2022"},{"key":"19_CR7","doi-asserted-by":"publisher","unstructured":"Mathur, A., et al.: Dark patterns at scale: findings from a crawl of 11K shopping websites. Proc. ACM Hum.-Comput. Interact. 3, 81:1\u201381:32 (2019). https:\/\/doi.org\/10.1145\/3359183","DOI":"10.1145\/3359183"},{"key":"19_CR8","doi-asserted-by":"publisher","unstructured":"Gray, C.M., Santos, C., Bielova, N., Toth, M., Clifford, D.: Dark patterns and the legal requirements of consent banners: an interaction criticism perspective. arXiv:2009.10194 [cs] (2021). https:\/\/doi.org\/10.1145\/3411764.3445779","DOI":"10.1145\/3411764.3445779"},{"key":"19_CR9","unstructured":"Data protection under GDPR. https:\/\/europa.eu\/youreurope\/business\/dealing-with-customers\/data-protection\/data-protection-gdpr\/index_en.htm. Accessed 28 Sept 2022"},{"key":"19_CR10","doi-asserted-by":"publisher","unstructured":"Santos, C., Bielova, N., Matte, C.: Are cookie banners indeed compliant with the law? Deciphering EU legal requirements on consent and technical means to verify compliance of cookie banners. http:\/\/arxiv.org\/abs\/1912.07144 (2020). https:\/\/doi.org\/10.48550\/arXiv.1912.07144","DOI":"10.48550\/arXiv.1912.07144"},{"key":"19_CR11","unstructured":"General Data Protection Regulation (2016). https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=CELEX:02016R0679-20160504&from=LT"},{"key":"19_CR12","doi-asserted-by":"publisher","unstructured":"Buthelezi, M.P., Loock, M.: User online privacy and identity management behaviors: a comparative study. In: 2014 Annual Global Online Conference on Information and Computer Technology, pp. 53\u201357 (2014). https:\/\/doi.org\/10.1109\/GOCICT.2014.14","DOI":"10.1109\/GOCICT.2014.14"},{"key":"19_CR13","unstructured":"Brignull, H.: Dark Patterns: inside the interfaces designed to trick you. https:\/\/www.theverge.com\/2013\/8\/29\/4640308\/dark-patterns-inside-the-interfaces-designed-to-trick-you. Accessed 29 Sept 2022"},{"key":"19_CR14","unstructured":"Schlosser, D.: LinkedIn Dark Patterns. https:\/\/medium.com\/@danrschlosser\/linkedin-dark-patterns-3ae726fe1462. Accessed 29 Sept 2022"},{"key":"19_CR15","unstructured":"Brignull, H.: Dark Patterns. https:\/\/www.darkpatterns.org\/index.html. Accessed 11 Feb 2021"},{"key":"19_CR16","doi-asserted-by":"publisher","unstructured":"Gray, C.M., Kou, Y., Battles, B., Hoggatt, J., Toombs, A.L.: The dark (patterns) side of UX design. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1\u201314. Association for Computing Machinery, New York, NY, USA (2018). https:\/\/doi.org\/10.1145\/3173574.3174108","DOI":"10.1145\/3173574.3174108"},{"key":"19_CR17","doi-asserted-by":"publisher","unstructured":"Luguri, J., Strahilevitz, L.: Shining a Light on Dark Patterns. Social Science Research Network, Rochester, NY (2019). https:\/\/doi.org\/10.2139\/ssrn.3431205","DOI":"10.2139\/ssrn.3431205"},{"key":"19_CR18","doi-asserted-by":"publisher","unstructured":"Utz, C., Degeling, M., Fahl, S., Schaub, F., Holz, T.: (Un)informed consent: studying GDPR consent notices in the field. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 973\u2013990. Association for Computing Machinery, New York, NY, USA (2019). https:\/\/doi.org\/10.1145\/3319535.3354212","DOI":"10.1145\/3319535.3354212"},{"key":"19_CR19","unstructured":"Chatellier, R., Delcroix, G., Hary, E., Girard-Chanudet, C.: Shaping choices in the digital world. From dark patterns to data protection: the influence of UX\/UI design on user empowerment. Technical report, CNIL (2019)"},{"key":"19_CR20","unstructured":"gemiusAudience: September overview of the most popular Lithuanian websites (in Lithuanian). http:\/\/www.gemius.lt\/interneto-ziniasklaidos-naujienos\/gemiusaudience-rugsejo-menesio-apzvalga-6411.html. Accessed 12 Oct 2022"}],"container-title":["Lecture Notes in Networks and Systems","Digital Interaction and Machine Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-37649-8_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,25]],"date-time":"2023-07-25T04:12:18Z","timestamp":1690258338000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-37649-8_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031376481","9783031376498"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-37649-8_19","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"value":"2367-3370","type":"print"},{"value":"2367-3389","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"25 July 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MIDI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Machine Intelligence and Digital Interaction Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"midi12022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/midi2022.opi.org.pl\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}