{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,23]],"date-time":"2025-10-23T01:56:22Z","timestamp":1761184582632,"version":"build-2065373602"},"publisher-location":"Singapore","reference-count":43,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819535392"},{"type":"electronic","value":"9789819535408"}],"license":[{"start":{"date-parts":[[2025,10,23]],"date-time":"2025-10-23T00:00:00Z","timestamp":1761177600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,23]],"date-time":"2025-10-23T00:00:00Z","timestamp":1761177600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-3540-8_30","type":"book-chapter","created":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T13:33:34Z","timestamp":1761140014000},"page":"564-583","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Why Biting the\u00a0Bait? Understanding Bait and\u00a0Switch UI Dark Patterns in\u00a0Mobile Apps"],"prefix":"10.1007","author":[{"given":"Yixi","family":"Lin","sequence":"first","affiliation":[]},{"given":"Yue","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Zitong","family":"Yao","sequence":"additional","affiliation":[]},{"given":"Yuhong","family":"Nan","sequence":"additional","affiliation":[]},{"given":"Queping","family":"Kong","sequence":"additional","affiliation":[]},{"given":"Xueqiang","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,23]]},"reference":[{"key":"30_CR1","unstructured":"Accessibility Guidelines Working Group: Understanding SC 1.4.3: Contrast (Minimum) (Level AA) (2024). https:\/\/www.w3.org\/WAI\/WCAG22\/Understanding\/contrast-minimum.html"},{"key":"30_CR2","unstructured":"Alibaba Cloud: Qwen (2024). https:\/\/tongyi.aliyun.com\/qianwen\/"},{"key":"30_CR3","unstructured":"Apple Inc.: XCTest (2024). https:\/\/developer.apple.com\/documentation\/xctest"},{"key":"30_CR4","unstructured":"Bai Kaiyin: ChineseOCR (2024). https:\/\/github.com\/chineseocr\/chineseocr"},{"key":"30_CR5","unstructured":"Brignull, H.: Dark patterns (2018). http:\/\/darkpatterns.org\/"},{"key":"30_CR6","doi-asserted-by":"crossref","unstructured":"Chen, J., et al.: Unveiling the tricks: automated detection of dark patterns in mobile applications. In: Proceedings of the 36th Annual ACM Symposium on User Interface Software and Technology, pp. 1\u201320 (2023)","DOI":"10.1145\/3586183.3606783"},{"key":"30_CR7","doi-asserted-by":"publisher","unstructured":"Chen, Q.A., et al.: QoE doctor: diagnosing mobile app QoE with automated UI control and cross-layer analysis. In: Proceedings of the 2014 Conference on Internet Measurement Conference, IMC \u201914, pp. 151\u2013164. Association for Computing Machinery, New York (2014). https:\/\/doi.org\/10.1145\/2663716.2663726","DOI":"10.1145\/2663716.2663726"},{"key":"30_CR8","unstructured":"Dan Cuellar: Appium (2024). https:\/\/appium.io\/docs\/en\/latest\/"},{"key":"30_CR9","doi-asserted-by":"crossref","unstructured":"Di\u00a0Geronimo, L., Braz, L., Fregnan, E., Palomba, F., Bacchelli, A.: UI dark patterns and where to find them: a study on mobile applications and user perception. In: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, pp. 1\u201314 (2020)","DOI":"10.1145\/3313831.3376600"},{"key":"30_CR10","unstructured":"European Union: Consumer Rights Directive (2011). https:\/\/eur-lex.europa.eu\/eli\/dir\/2011\/83\/oj"},{"key":"30_CR11","unstructured":"European Union: Unfair commercial practices (2024). https:\/\/europa.eu\/youreurope\/citizens\/consumers\/unfair-treatment\/unfair-commercial-practices\/"},{"key":"30_CR12","unstructured":"Federal Trade Commission: Illegal Program Subscription (2018). https:\/\/www.ftc.gov\/legal-library\/browse\/cases-proceedings\/172-3186-age-learning-inc-abcmouse"},{"key":"30_CR13","unstructured":"Federal Trade Commission: Bringing Dark Patterns to Light (2022). https:\/\/www.ftc.gov\/news-events\/events\/2021\/04\/bringing-dark-patterns-light-ftc-workshop"},{"key":"30_CR14","unstructured":"Federal Trade Commission: Fraud Purchase Case (2022). https:\/\/www.ftc.gov\/business-guidance\/blog\/2023\/11\/ftc-california-allege-cri-genetics-made-deceptive-dna-accuracy-claims-falsified-reviews-used"},{"key":"30_CR15","unstructured":"Federal Trade Commission: FTC Act (2024). https:\/\/www.ftc.gov\/legal-library\/browse\/statutes\/federal-trade-commission-act"},{"key":"30_CR16","unstructured":"Federal Trade Commission: Penalty Offenses Concerning Bait & Switch (2024). https:\/\/www.ftc.gov\/enforcement\/penalty-offenses\/bait-switch"},{"key":"30_CR17","unstructured":"Gaotu Education Technology Group Co., Ltd: Maodou Loves Ancient Poetry, a Chinese app designed for kids (2024). https:\/\/feihua100.com\/"},{"key":"30_CR18","unstructured":"Google: Google Play (2024). https:\/\/play.google.com\/store\/apps"},{"key":"30_CR19","unstructured":"Google: UiAutomator2 (2024). https:\/\/github.com\/openatx\/uiautomator2"},{"key":"30_CR20","unstructured":"Government of Norway: Marketing Control Act (2018). https:\/\/www.forbrukertilsynet.no\/english\/the-marketing-control-act"},{"key":"30_CR21","doi-asserted-by":"publisher","unstructured":"Gray, C.M., Kou, Y., Battles, B., Hoggatt, J., Toombs, A.L.: The dark (patterns) side of UX design. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, CHI \u201918, pp. 1\u201314. Association for Computing Machinery, New York (2018). https:\/\/doi.org\/10.1145\/3173574.3174108","DOI":"10.1145\/3173574.3174108"},{"key":"30_CR22","doi-asserted-by":"publisher","unstructured":"Greenberg, S., Boring, S., Vermeulen, J., Dostal, J.: Dark patterns in proxemic interactions: a critical perspective. In: Proceedings of the 2014 Conference on Designing Interactive Systems, DIS \u201914, pp. 523\u2013532. Association for Computing Machinery, New York (2014). https:\/\/doi.org\/10.1145\/2598510.2598541","DOI":"10.1145\/2598510.2598541"},{"key":"30_CR23","doi-asserted-by":"publisher","unstructured":"Hao, S., Liu, B., Nath, S., Halfond, W.G., Govindan, R.: PUMA: programmable UI-automation for large-scale dynamic analysis of mobile apps. In: Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys \u201914, pp. 204\u2013217. Association for Computing Machinery, New York (2014). https:\/\/doi.org\/10.1145\/2594368.2594390","DOI":"10.1145\/2594368.2594390"},{"key":"30_CR24","unstructured":"Harry Brignull: Bait and Switch (2012). https:\/\/old.deceptive.design\/bait_and_switch\/"},{"key":"30_CR25","unstructured":"HumanSignal: labelImg (2024). https:\/\/github.com\/HumanSignal\/labelImg"},{"key":"30_CR26","doi-asserted-by":"crossref","unstructured":"Liu, T., et al.: Maddroid: characterizing and detecting devious ad contents for android apps. In: Proceedings of the Web Conference 2020, pp. 1715\u20131726 (2020)","DOI":"10.1145\/3366423.3380242"},{"key":"30_CR27","doi-asserted-by":"publisher","unstructured":"Long, M., Xu, Y., Wu, J., Ou, Q., Nan, Y.: Understanding dark UI patterns in the mobile ecosystem: a case study of apps in China. In: Proceedings of the 2023 ACM Workshop on Secure and Trustworthy Superapps, SaTS \u201923, pp. 33\u201340. Association for Computing Machinery, New York (2023). https:\/\/doi.org\/10.1145\/3605762.3624431","DOI":"10.1145\/3605762.3624431"},{"issue":"1","key":"30_CR28","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1093\/jla\/laaa006","volume":"13","author":"J Luguri","year":"2021","unstructured":"Luguri, J., Strahilevitz, L.J.: Shining a light on dark patterns. J. Legal Anal. 13(1), 43\u2013109 (2021)","journal-title":"J. Legal Anal."},{"key":"30_CR29","doi-asserted-by":"crossref","unstructured":"Mansur, S.H., Salma, S., Awofisayo, D., Moran, K.: Aidui: toward automated recognition of dark patterns in user interfaces. In: 2023 IEEE\/ACM 45th International Conference on Software Engineering (ICSE), pp. 1958\u20131970. IEEE (2023)","DOI":"10.1109\/ICSE48619.2023.00166"},{"key":"30_CR30","doi-asserted-by":"crossref","unstructured":"Mathur, A., et al.: Dark patterns at scale: findings from a crawl of 11K shopping websites. Proc. ACM Hum.-Comput. Interact. 3(CSCW), 1\u201332 (2019)","DOI":"10.1145\/3359183"},{"key":"30_CR31","doi-asserted-by":"publisher","unstructured":"Mathur, A., Kshirsagar, M., Mayer, J.: What makes a dark pattern... dark? design attributes, normative considerations, and measurement methods. In: Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems, CHI \u201921. Association for Computing Machinery, New York (2021).https:\/\/doi.org\/10.1145\/3411764.3445610","DOI":"10.1145\/3411764.3445610"},{"key":"30_CR32","unstructured":"Ministry of Industry and Information Technology: Identification Method of App\u2019s Illegal Collection and Use of Personal Information (2023). https:\/\/www.miit.gov.cn\/xwdt\/gxdt\/sjdt\/art\/2020\/art_7ec9786084224c0db9628de5becb1085.html"},{"key":"30_CR33","unstructured":"OpenAI: GPT-4 (2023). https:\/\/openai.com\/gpt-4"},{"key":"30_CR34","unstructured":"Pea Labs: Wandoujia (2023). https:\/\/www.wandoujia.com"},{"key":"30_CR35","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"933","DOI":"10.1007\/978-981-16-5157-1_72","volume-title":"Sentimental Analysis and Deep Learning","author":"SH Raju","year":"2022","unstructured":"Raju, S.H., Waris, S.F., Adinarayna, S., Jadala, V.C., Rao, G.S.: Smart dark pattern detection: making aware of misleading patterns through the intended app. In: Shakya, S., Balas, V.E., Kamolphiwong, S., Du, K.-L. (eds.) Sentimental Analysis and Deep Learning. AISC, vol. 1408, pp. 933\u2013947. Springer, Singapore (2022). https:\/\/doi.org\/10.1007\/978-981-16-5157-1_72"},{"key":"30_CR36","unstructured":"State Administration for Market Regulation: Measures for the Management of Internet Advertising (2023). https:\/\/www.gov.cn\/gongbao\/2023\/issue_10506\/202306\/content_6885261.html"},{"key":"30_CR37","unstructured":"Tencent: Tencent App Store (2024). https:\/\/sj.qq.com\/"},{"key":"30_CR38","unstructured":"Ultralytics: YOLOv5 (2024). https:\/\/github.com\/ultralytics\/yolov5"},{"key":"30_CR39","unstructured":"UXP2 Lab: UXP2 Dark Patterns (2024). https:\/\/darkpatterns.uxp2.com\/"},{"key":"30_CR40","first-page":"24824","volume":"35","author":"J Wei","year":"2022","unstructured":"Wei, J., et al.: Chain-of-thought prompting elicits reasoning in large language models. Adv. Neural. Inf. Process. Syst. 35, 24824\u201324837 (2022)","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"30_CR41","doi-asserted-by":"publisher","unstructured":"Xie, M., Feng, S., Xing, Z., Chen, J., Chen, C.: UIED: a hybrid tool for GUI element detection. In: Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, ESEC\/FSE 2020, pp. 1655\u20131659. Association for Computing Machinery, New York (2020). https:\/\/doi.org\/10.1145\/3368089.3417940","DOI":"10.1145\/3368089.3417940"},{"key":"30_CR42","unstructured":"Youku Tudou Inc.: Youku Video (2024). https:\/\/youku.com"},{"key":"30_CR43","doi-asserted-by":"crossref","unstructured":"Zhou, H., et al.: UI obfuscation and its effects on automated UI analysis for android apps. In: Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering, pp. 199\u2013210 (2020)","DOI":"10.1145\/3324884.3416642"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-3540-8_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T22:03:57Z","timestamp":1761170637000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-3540-8_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,23]]},"ISBN":["9789819535392","9789819535408"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-3540-8_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025,10,23]]},"assertion":[{"value":"23 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information and Communications Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nanjing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icics2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.icics2025.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}