{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T11:15:35Z","timestamp":1775042135366,"version":"3.50.1"},"publisher-location":"Cham","reference-count":11,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031422799","type":"print"},{"value":"9783031422805","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-42280-5_20","type":"book-chapter","created":{"date-parts":[[2023,8,24]],"date-time":"2023-08-24T18:04:47Z","timestamp":1692900287000},"page":"339-348","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Dark Finance: Exploring Deceptive Design in Investment Apps"],"prefix":"10.1007","author":[{"given":"Ivana","family":"Rakovic","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9919-6637","authenticated-orcid":false,"given":"Yavuz","family":"Inal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,25]]},"reference":[{"issue":"4","key":"20_CR1","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1515\/popets-2016-0038","volume":"2016","author":"C B\u00f6sch","year":"2016","unstructured":"B\u00f6sch, C., Erb, B., Kargl, F., Kopp, H., Pfattheicher, S.: Tales from the dark side: privacy dark strategies and privacy dark patterns. Proc. Priv. Enhancing Technol. 2016(4), 237\u2013254 (2016)","journal-title":"Proc. Priv. Enhancing Technol."},{"key":"20_CR2","unstructured":"Brignull, H.: Deceptive design. https:\/\/www.deceptive.design\/. Accessed 20 Mar 2023"},{"key":"20_CR3","doi-asserted-by":"publisher","unstructured":"Conti, G., Sobiesk, E.: Malicious interface design: exploiting the user. In: Proceedings of the 19th International Conference on World Wide Web, North Carolina, USA, pp. 271\u2013280. ACM (2010). https:\/\/doi.org\/10.1145\/1772690.1772719","DOI":"10.1145\/1772690.1772719"},{"key":"20_CR4","doi-asserted-by":"publisher","unstructured":"Di Geronimo, L., Braz, L., Fregnan, E., Palomba, F., Bacchelli, A.: UI dark patterns and where to find them: a study on mobile applications and user perception. In: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, pp. 1\u201314. ACM (2020). https:\/\/doi.org\/10.1145\/3313831.3376600","DOI":"10.1145\/3313831.3376600"},{"key":"20_CR5","unstructured":"Finansportalen. https:\/\/www.finansportalen.no\/plassere-penger\/. Accessed 22 Feb 2022"},{"key":"20_CR6","doi-asserted-by":"publisher","unstructured":"Gray, C.M., Kou, Y., Battles, B., Hoggatt, J., Toombs, A.L.: The dark (patterns) side of UX design. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp. 1\u201314. ACM (2018). https:\/\/doi.org\/10.1145\/3173574.3174108","DOI":"10.1145\/3173574.3174108"},{"key":"20_CR7","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/978-1-4302-6422-4_10","volume-title":"Irresistible Apps","author":"C Lewis","year":"2014","unstructured":"Lewis, C.: Monetary dark patterns. In: Irresistible Apps, pp. 111\u2013117. Apress, Berkeley, CA (2014). https:\/\/doi.org\/10.1007\/978-1-4302-6422-4_10"},{"key":"20_CR8","doi-asserted-by":"publisher","unstructured":"Mathur, A., et al.: Dark patterns at scale: findings from a crawl of 11K shopping websites. In: Proceedings of the ACM on Human-Computer Interaction (CSCW), vol. 3, pp. 1\u201332. ACM (2019). https:\/\/doi.org\/10.1145\/3359183","DOI":"10.1145\/3359183"},{"key":"20_CR9","unstructured":"Neste Bank. https:\/\/nestebank.no\/banker\/. Accessed 22 Feb 2022"},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Rakovic, I: Dark finance: exploring deceptive design in investment apps. Master\u2019s Thesis, NTNU (2022)","DOI":"10.1007\/978-3-031-42280-5_20"},{"key":"20_CR11","doi-asserted-by":"publisher","unstructured":"Soe, T.H., Nordberg, O.E., Guribye, F., Slavkovik, M.: Circumvention by design - dark patterns in cookie consent for online news outlets. In: Proceedings of the 11th Nordic Conference on Human-Computer Interaction: Shaping Experiences, Shaping Society, pp. 1\u201312. ACM (2020). https:\/\/doi.org\/10.1145\/3419249.3420132","DOI":"10.1145\/3419249.3420132"}],"container-title":["Lecture Notes in Computer Science","Human-Computer Interaction \u2013 INTERACT 2023"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-42280-5_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,26]],"date-time":"2024-10-26T20:47:32Z","timestamp":1729975652000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-42280-5_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031422799","9783031422805"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-42280-5_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"25 August 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"INTERACT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"York","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 August 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 September 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"interact2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"PCS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"406","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"71","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"58","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"17% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4,01","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2,75","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Courses: 6 Industrial Experiences: 2 Interactive demos: 10 Panels: 2 Keynotes: 2 Posters: 44 Workshop summaries: 16- Submissions -As for full paper: 220 As for short papers: 186","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}