{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,24]],"date-time":"2026-04-24T11:48:22Z","timestamp":1777031302237,"version":"3.51.4"},"reference-count":87,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Prime Minister Research Fellowship","award":["Prime Minister Research Fellowship"],"award-info":[{"award-number":["Prime Minister Research Fellowship"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ethics Inf Technol"],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1007\/s10676-022-09672-9","type":"journal-article","created":{"date-parts":[[2022,12,5]],"date-time":"2022-12-05T05:05:31Z","timestamp":1670216731000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["Conceptualizations of user autonomy within the normative evaluation of dark patterns"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5178-5077","authenticated-orcid":false,"given":"Sanju","family":"Ahuja","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3810-3262","authenticated-orcid":false,"given":"Jyoti","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,12,5]]},"reference":[{"key":"9672_CR1","doi-asserted-by":"publisher","unstructured":"Ahuja, S., & Kumar, J. (2020). Surveillance based Persuasion: The Good, The Bad and The Ugly. 4th International Conference on Computer-Human Interaction Research and Applications (CHIRA \u201820), Budapest, Hungary. https:\/\/doi.org\/10.5220\/0010121401200127","DOI":"10.5220\/0010121401200127"},{"key":"9672_CR2","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1007\/s40547-017-0085-8","volume":"5","author":"Q Andr\u00e9","year":"2018","unstructured":"Andr\u00e9, Q., Carmon, Z., Wertenbroch, K., Crum, A., Frank, D., Goldstein, W., Huber, J., van Boven, L., Weber, B., & Yang, H. (2018). Consumer choice and autonomy in the age of artificial intelligence and big data. Customer Needs and Solutions, 5, 28\u201337. https:\/\/doi.org\/10.1007\/s40547-017-0085-8","journal-title":"Customer Needs and Solutions"},{"issue":"5","key":"9672_CR3","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1145\/301353.301410","volume":"42","author":"D Berdichevsky","year":"1999","unstructured":"Berdichevsky, D., & Neuenschwander, E. (1999). Toward an ethics of persuasive technology. Communications of the ACM, 42(5), 51\u201358. https:\/\/doi.org\/10.1145\/301353.301410.","journal-title":"Communications of the ACM"},{"key":"9672_CR4","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1075\/ceb.5.05bet","volume-title":"Emotions, ethics, and authenticity","author":"M Betzler","year":"2009","unstructured":"Betzler, M. (2009). Authenticity and self-governance. In M. Salmela & V. Mayer (Eds.), Emotions, ethics, and authenticity (pp. 51\u201368). John Benjamins Publishing Company."},{"key":"9672_CR5","doi-asserted-by":"publisher","unstructured":"Bongard-Blanchy, K., Rossi, A., Rivas, S., Doublet, S., Koenig, V., & Lenzini, G. (2021). \u201cI am definitely manipulated, even when i am aware of it. It\u2019s ridiculous!\u201d\u2014 Dark patterns from the end-user perspective. ACM Designing Interactive Systems Conference (DIS \u201921), Virtual Event, USA. https:\/\/doi.org\/10.1145\/3461778.3462086","DOI":"10.1145\/3461778.3462086"},{"key":"9672_CR6","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1515\/popets-2016-0038","volume":"4","author":"C B\u00f6sch","year":"2016","unstructured":"B\u00f6sch, C., Erb, B., Kargl, F., Kopp, H., & Pfattheicher, S. (2016). Tales from the dark side: Privacy dark strategies and privacy dark patterns. Proceedings on Privacy Enhancing Technologies, 4, 237\u2013254. https:\/\/doi.org\/10.1515\/popets-2016-0038","journal-title":"Proceedings on Privacy Enhancing Technologies"},{"issue":"6","key":"9672_CR7","doi-asserted-by":"publisher","first-page":"1065","DOI":"10.1086\/656570","volume":"37","author":"S Botti","year":"2011","unstructured":"Botti, S., & McGill, A. L. (2011). The locus of choice: personal causality and satisfaction with hedonic and utilitarian decisions. Journal of Consumer Research, 37(6), 1065\u20131078. https:\/\/doi.org\/10.1086\/656570.","journal-title":"Journal of Consumer Research"},{"key":"9672_CR8","volume-title":"A theory of psychological reactance","author":"JW Brehm","year":"1966","unstructured":"Brehm, J. W. (1966). A theory of psychological reactance. Academic Press."},{"key":"9672_CR9","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/s10676-006-0005-3","volume":"7","author":"P Brey","year":"2005","unstructured":"Brey, P. (2005). Freedom and privacy in ambient intelligence. Ethics & Information Technology, 7, 157\u2013166. https:\/\/doi.org\/10.1007\/s10676-006-0005-3","journal-title":"Ethics & Information Technology"},{"key":"9672_CR10","unstructured":"Brignull, H. (2010). What are dark patterns?. Retrieved March 22, 2022, from https:\/\/www.darkpatterns.org\/"},{"key":"9672_CR11","unstructured":"Buss, S., & Westlund, A. (2018). Personal Autonomy The Stanford Encyclopedia of Philosophy (Spring 2018 Edition), Edward N. Zalta (ed.). Retrieved March 22, 2022 from https:\/\/plato.stanford.edu\/archives\/spr2018\/entries\/personal-autonomy\/"},{"key":"9672_CR12","unstructured":"California Secretary of State (2020). Qualified statewide ballot measures. Retrieved March 22, 2022 from https:\/\/www.oag.ca.gov\/system\/files\/initiatives\/pdfs\/19-0021A1%20%28Consumer%20Privacy%20-%20Version%203%29_1.pdf"},{"key":"9672_CR13","unstructured":"Christman, J. (2020). Autonomy in moral and political philosophy. The Stanford encyclopedia of philosophy (Fall 2020 Edition), Edward N. Zalta (ed.). Retrieved March 22, 2022 from https:\/\/plato.stanford.edu\/archives\/fall2020\/entries\/autonomy-moral\/"},{"key":"9672_CR14","doi-asserted-by":"publisher","unstructured":"Chung, C., Gorm, N., Shklovski, I. A., & Munson, S. (2017). Finding the right fit: Understanding health tracking in workplace wellness programs. ACM CHI Conference on Human Factors in Computing Systems (CHI \u201817), Denver, Colorado, USA. https:\/\/doi.org\/10.1145\/3025453.3025510","DOI":"10.1145\/3025453.3025510"},{"key":"9672_CR15","volume-title":"Influence: The psychology of persuasion\u00a0","author":"RB Cialdini","year":"2007","unstructured":"Cialdini, R. B. (2007). Influence: The psychology of persuasion\u00a0 Collins."},{"key":"9672_CR16","doi-asserted-by":"publisher","unstructured":"Conti, G., & Sobiesk, E. (2010). Malicious interface design: Exploiting the user. 19th International Conference on World Wide Web (WWW \u201910), Raleigh, North Carolina, USA. https:\/\/doi.org\/10.1145\/1772690.1772719","DOI":"10.1145\/1772690.1772719"},{"issue":"1","key":"9672_CR17","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1016\/j.jretconser.2007.03.006","volume":"15","author":"M Corti\u00f1as","year":"2008","unstructured":"Corti\u00f1as, M., Elorz, M., & Mugica, J. (2008). The use of loyalty-cards databases: Differences in regular price and discount sensitivity in the brand choice decision between card and non-card holders. Journal of Retailing and Consumer Services, 15(1), 52\u201362. https:\/\/doi.org\/10.1016\/j.jretconser.2007.03.006.","journal-title":"Journal of Retailing and Consumer Services"},{"issue":"4","key":"9672_CR18","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1207\/s15327965pli1104_01","volume":"11","author":"EL Deci","year":"2000","unstructured":"Deci, E. L., & Ryan, R. M. (2000). The \u201cwhat\u201d and \u201cwhy\u201d of goal pursuits: Human needs and the self-determination of behavior. Psychological Inquiry, 11(4), 227\u2013268. https:\/\/doi.org\/10.1207\/s15327965pli1104_01","journal-title":"Psychological Inquiry"},{"issue":"1","key":"9672_CR19","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1509\/jmr.10.0490","volume":"49","author":"R Dhar","year":"2012","unstructured":"Dhar, R., & Wertenbroch, K. (2012). Self-signaling and the costs and benefits of temptation in consumer choice. Journal of Marketing Research, 49(1), 15\u201325. https:\/\/doi.org\/10.1509\/jmr.10.0490.","journal-title":"Journal of Marketing Research"},{"issue":"3","key":"9672_CR20","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/s12152-010-9090-4","volume":"4","author":"A Erler","year":"2011","unstructured":"Erler, A. (2011). Does memory modification threaten our authenticity? Neuroethics, 4(3), 235\u2013249. https:\/\/doi.org\/10.1007\/s12152-010-9090-4","journal-title":"Neuroethics"},{"key":"9672_CR21","doi-asserted-by":"crossref","unstructured":"Fogg, B. J. (2002). Persuasive technology: using computers to change what we think and do. Morgan Kaufmann Publishers.","DOI":"10.1145\/764008.763957"},{"issue":"1","key":"9672_CR22","doi-asserted-by":"publisher","first-page":"5","DOI":"10.2307\/2024717","volume":"68","author":"HG Frankfurt","year":"1971","unstructured":"Frankfurt, H. G. (1971). Freedom of the will and the concept of a person. Journal of Philosophy, 68(1), 5\u201320. https:\/\/doi.org\/10.2307\/2024717.","journal-title":"Journal of Philosophy"},{"key":"9672_CR23","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/s12152-018-9364-9","volume":"14","author":"O Friedrich","year":"2018","unstructured":"Friedrich, O., Racine, E., Steinert, S., P\u00f6msl, J., & Jox, R. J. (2018). An analysis of the impact of brain-computer interfaces on autonomy. Neuroethics, 14, 17\u201329. https:\/\/doi.org\/10.1007\/s12152-018-9364-9.","journal-title":"Neuroethics"},{"issue":"1","key":"9672_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1086\/209380","volume":"21","author":"M Friestad","year":"1994","unstructured":"Friestad, M., & Wright, P. (1994). The persuasion knowledge model: How people cope with persuasion attempts. Journal of Consumer Research, 21(1), 1\u201331.","journal-title":"Journal of Consumer Research"},{"key":"9672_CR25","doi-asserted-by":"publisher","DOI":"10.1017\/9781316544846","volume-title":"Re-engineering humanity","author":"B Frischmann","year":"2018","unstructured":"Frischmann, B., & Selinger, E. (2018). Re-engineering humanity. Cambridge University Press."},{"key":"9672_CR26","unstructured":"Frobrukerr\u00e5det [Norwegian Consumer Council or NCC] (2018). Deceived by design: How tech companies use dark patterns to discourage us from exercising our rights to privacy Retrieved March 22, 2022 from https:\/\/fil.forbrukerradet.no\/wp-content\/uploads\/2018\/06\/2018-06-27-deceived-by-design-final.pdf"},{"key":"9672_CR27","unstructured":"General Data Protection Regulation (GDPR) (2018). Retrieved March 22, 2022 from https:\/\/gdpr.eu\/tag\/gdpr\/"},{"key":"9672_CR28","doi-asserted-by":"publisher","unstructured":"Gray, C. M., Chivukula, S. S., & Lee, A. (2020). What kind of work do \u201cAsshole Designers\u201d create? Describing properties of ethical concern on reddit. ACM Designing Interactive Systems Conference (DIS \u201920), Eindhoven, Netherlands. https:\/\/doi.org\/10.1145\/3357236.3395486","DOI":"10.1145\/3357236.3395486"},{"key":"9672_CR29","doi-asserted-by":"publisher","unstructured":"Gray, C. M., Kou, Y., Battles, B., Hoggatt, J., & Toombs, A. L. (2018). The dark (patterns) side of UX design. CHI Conference on Human Factors in Computing Systems (CHI \u201918), Montreal, QC, Canada. https:\/\/doi.org\/10.1145\/3173574.3174108","DOI":"10.1145\/3173574.3174108"},{"key":"9672_CR30","doi-asserted-by":"publisher","unstructured":"Greenberg, G., Boring, S., Vermeulen, J., & Dostal, J. (2014). Dark patterns in proxemic interactions: A critical perspective. ACM Designing Interactive Systems Conference (DIS \u201914), Vancouver, BC, Canada. https:\/\/doi.org\/10.1145\/2598510.2598541","DOI":"10.1145\/2598510.2598541"},{"key":"9672_CR31","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1017\/S1867299X00002762","volume":"1","author":"PG Hansen","year":"2013","unstructured":"Hansen, P. G., & Jespersen, A. M. (2013). Nudge and the manipulation of choice: A framework for the responsible use of the nudge approach to behaviour change in public policy. European Journal of Risk Regulation, 1, 3\u201328.","journal-title":"European Journal of Risk Regulation"},{"key":"9672_CR32","volume-title":"Manufacturing consent: The political economy of the mass media","author":"ES Herman","year":"1988","unstructured":"Herman, E. S., & Chomsky, N. (1988). Manufacturing consent: The political economy of the mass media. Pantheon Books."},{"issue":"5","key":"9672_CR33","doi-asserted-by":"publisher","first-page":"519","DOI":"10.1111\/bioe.12683","volume":"34","author":"N Jacobs","year":"2019","unstructured":"Jacobs, N. (2019). Two ethical concerns about the use of persuasive technology for vulnerable people. Bioethics, 34(5), 519\u2013526. https:\/\/doi.org\/10.1111\/bioe.12683.","journal-title":"Bioethics"},{"issue":"2","key":"9672_CR34","doi-asserted-by":"publisher","first-page":"263","DOI":"10.2307\/1914185","volume":"47","author":"D Kahneman","year":"1979","unstructured":"Kahneman, D., & Tversky, A. (1979). Prospect theory: An analysis of decision under risk. Econometrica, 47(2), 263\u2013292. https:\/\/doi.org\/10.2307\/1914185","journal-title":"Econometrica"},{"key":"9672_CR35","doi-asserted-by":"publisher","unstructured":"Krisam, C., Dietmann, H., Volkamer, M., & Kulyk, O. (2021). Dark patterns in the wild: Review of cookie disclaimer designs on top 500 German websites. European Symposium on Usable Security (EuroUSEC \u201921), Karlsruhe, Germany. https:\/\/doi.org\/10.1145\/3481357.3481516","DOI":"10.1145\/3481357.3481516"},{"key":"9672_CR36","doi-asserted-by":"publisher","unstructured":"Lacey, C., & Caudwell, C. (2019). Cuteness as a \u2018Dark Pattern\u2019 in home robots. 14th ACM\/IEEE International Conference on Human-Robot Interaction (HRI \u201819), Daegu, South Korea. https:\/\/doi.org\/10.1109\/HRI.2019.8673274","DOI":"10.1109\/HRI.2019.8673274"},{"issue":"2","key":"9672_CR37","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1037\/0022-3514.34.2.191","volume":"34","author":"EJ Langer","year":"1976","unstructured":"Langer, E. J., & Rodin, J. (1976). The effects of choice and enhanced personal responsibility for the aged: a field experiment in an institutional setting. Journal of Personality and Social Psychology, 34(2), 191\u2013198. https:\/\/doi.org\/10.1037\/0022-3514.34.2.191.","journal-title":"Journal of Personality and Social Psychology"},{"issue":"3","key":"9672_CR38","doi-asserted-by":"publisher","first-page":"627","DOI":"10.2307\/1945515","volume":"21","author":"H Lasswell","year":"1927","unstructured":"Lasswell, H. (1927). The theory of political propaganda. American Political Science Review, 21(3), 627\u2013631. https:\/\/doi.org\/10.2307\/1945515","journal-title":"American Political Science Review"},{"key":"9672_CR39","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511811890","volume-title":"Neuroethics","author":"N Levy","year":"2007","unstructured":"Levy, N. (2007). Neuroethics. Cambridge University Press."},{"key":"9672_CR40","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4302-6422-4","volume-title":"Irresistible apps: Motivational design patterns for apps, games, and web-based communities","author":"C Lewis","year":"2014","unstructured":"Lewis, C. (2014). Irresistible apps: Motivational design patterns for apps, games, and web-based communities. Apress."},{"key":"9672_CR41","volume-title":"Buyology: How everything we believe about why we buy is wrong","author":"M Lindstrom","year":"2012","unstructured":"Lindstrom, M. (2012). Buyology: How everything we believe about why we buy is wrong. Random House."},{"issue":"2","key":"9672_CR42","doi-asserted-by":"publisher","first-page":"170","DOI":"10.17011\/ht\/urn.202008245641","volume":"16","author":"MA Maier","year":"2020","unstructured":"Maier, M. A., & Harr, R. (2020). Dark design patterns: An end-user perspective. Human Technology, 16(2), 170\u2013199. https:\/\/doi.org\/10.17011\/ht\/urn.202008245641","journal-title":"Human Technology"},{"key":"9672_CR43","volume-title":"Relational autonomy: Feminist perspectives on autonomy, agency, and the social self","year":"2000","unstructured":"Mackenzie, C., & Stoljar, N. (Eds.). (2000). Relational autonomy: Feminist perspectives on autonomy, agency, and the social self. Oxford University Press."},{"key":"9672_CR44","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1007\/978-94-007-4707-4_10","volume-title":"Handbook of neuroethics","author":"C Mackenzie","year":"2015","unstructured":"Mackenzie, C., & Walker, M. (2015). Neurotechnologies, personal identity, and the ethics of authenticity. In J. Clausen & N. Levy (Eds.), Handbook of neuroethics (pp. 373\u2013392). Springer."},{"key":"9672_CR45","doi-asserted-by":"publisher","unstructured":"Mathur, A., Acar, G., Friedman, M. J., Lucherini, E., Mayer, J., Chetty, M., & Narayanan, A. (2019). Dark patterns at scale: Findings from a crawl of 11K shopping websites. Proceedings of the ACM on Human Computer Interaction, 3 (CSCW), 1\u201332. https:\/\/doi.org\/10.1145\/3359183","DOI":"10.1145\/3359183"},{"key":"9672_CR46","doi-asserted-by":"publisher","unstructured":"Mathur, A., Mayer, J., & Kshirsagar, M. (2021). What makes a dark pattern\u2026 dark?: Design attributes, normative considerations, and measurement methods. ACM CHI Conference on Human Factors in Computing Systems (CHI \u201921), Yokohama, Japan. https:\/\/doi.org\/10.1145\/3411764.3445610","DOI":"10.1145\/3411764.3445610"},{"issue":"1","key":"9672_CR47","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1080\/03085147.2019.1570707","volume":"48","author":"L McFall","year":"2019","unstructured":"McFall, L. (2019). Personalizing solidarity? The role of self-tracking in health insurance pricing. Economy and Society, 48(1), 52\u201376. https:\/\/doi.org\/10.1080\/03085147.2019.1570707.","journal-title":"Economy and Society"},{"key":"9672_CR48","doi-asserted-by":"publisher","unstructured":"Mhaidli, A., & Schaub, F. (2021). Identifying manipulative advertising techniques in XR through scenario construction. CHI Conference on Human Factors in Computing Systems (CHI \u201921), Yokohama, Japan. https:\/\/doi.org\/10.1145\/3411764.3445253","DOI":"10.1145\/3411764.3445253"},{"issue":"3","key":"9672_CR49","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1177\/002224298204600313","volume":"46","author":"RE Milliman","year":"1982","unstructured":"Milliman, R. E. (1982). Using background music to affect the behavior of supermarket shoppers. Journal of Marketing, 46(3), 86\u201391. https:\/\/doi.org\/10.1177\/002224298204600313","journal-title":"Journal of Marketing"},{"key":"9672_CR50","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/s10676-014-9339-4","volume":"16","author":"M Nagenborg","year":"2014","unstructured":"Nagenborg, M. (2014). Surveillance and persuasion. Ethics and Information Technology, 16, 43\u201349. https:\/\/doi.org\/10.1007\/s10676-014-9339-4.","journal-title":"Ethics and Information Technology"},{"key":"9672_CR51","unstructured":"National Commission on Informatics and Liberty (CNIL) (2020). Shaping choices in the digital world. Retrieved March 23, 2022 from https:\/\/linc.cnil.fr\/sites\/default\/files\/atoms\/files\/cnil_ip_report_06_shaping_choices_in_the_digital_world.pdf"},{"key":"9672_CR52","volume-title":"The filter bubble: What the Internet is hiding from you","author":"E Pariser","year":"2011","unstructured":"Pariser, E. (2011). The filter bubble: What the Internet is hiding from you. Penguin Books."},{"issue":"1","key":"9672_CR53","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1177\/147078539804000105","volume":"40","author":"J Passingham","year":"1998","unstructured":"Passingham, J. (1998). Grocery retailing and the loyalty card. Market Research Society Journal, 40(1), 1\u20138. https:\/\/doi.org\/10.1177\/147078539804000105","journal-title":"Market Research Society Journal"},{"key":"9672_CR54","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-021-04970-6","author":"E Petrovskaya","year":"2021","unstructured":"Petrovskaya, E., & Zendle, D. (2021). Predatory monetisation? A categorisation of unfair, misleading and aggressive monetisation techniques in digital games from the player perspective. Journal of Business Ethics. https:\/\/doi.org\/10.1007\/s10551-021-04970-6","journal-title":"Journal of Business Ethics"},{"issue":"1","key":"9672_CR55","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1177\/074391569701600102","volume":"16","author":"RD Petty","year":"1997","unstructured":"Petty, R. D. (1997). Advertising law in the United States and European Union. Journal of Public Policy & Marketing, 16(1), 2\u201313.","journal-title":"Journal of Public Policy & Marketing"},{"issue":"4","key":"9672_CR56","doi-asserted-by":"publisher","first-page":"640","DOI":"10.1017\/S0963180117000147","volume":"26","author":"J Pugh","year":"2017","unstructured":"Pugh, J., Maslen, H., & Savalescu, J. (2017). Deep brain stimulation, authenticity and value. Cambridge Quarterly of Healthcare Ethics, 26(4), 640\u2013657. https:\/\/doi.org\/10.1017\/S0963180117000147","journal-title":"Cambridge Quarterly of Healthcare Ethics"},{"key":"9672_CR57","unstructured":"Roskies, A. (2021). Neuroethics The Stanford Encyclopedia of Philosophy (Spring 2021 Edition), Edward N. Zalta (ed.). https:\/\/plato.stanford.edu\/archives\/spr2021\/entries\/neuroethics\/"},{"issue":"1","key":"9672_CR58","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1037\/0003-066X.55.1.68","volume":"55","author":"RM Ryan","year":"2000","unstructured":"Ryan, R. M., & Deci, E. L. (2000). Self-determination theory and the facilitation of intrinsic motivation, social development, and well-being. American Psychologist, 55(1), 68\u201378. https:\/\/doi.org\/10.1037\/0003-066X.55.1.68.","journal-title":"American Psychologist"},{"key":"9672_CR59","doi-asserted-by":"publisher","first-page":"487","DOI":"10.1136\/medethics-2012-100727","volume":"39","author":"Y Saghai","year":"2013","unstructured":"Saghai, Y. (2013). Salvaging the concept of nudge. Journal of Medical Ethics, 39, 487\u2013493. https:\/\/doi.org\/10.1136\/medethics-2012-100727.","journal-title":"Journal of Medical Ethics"},{"key":"9672_CR60","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199684878.001.0001","volume-title":"Staying alive: Personal identity, practical concerns, and the unity of a life","author":"M Schechtman","year":"2014","unstructured":"Schechtman, M. (2014). Staying alive: Personal identity, practical concerns, and the unity of a life. Oxford University Press."},{"key":"9672_CR61","volume-title":"Addiction by design: Machine gambling in Las Vegas","author":"ND Sch\u00fcll","year":"2012","unstructured":"Sch\u00fcll, N. D. (2012). Addiction by design: Machine gambling in Las Vegas. Princeton University Press."},{"key":"9672_CR62","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/s13347-016-0215-5","volume":"30","author":"T Sharon","year":"2017","unstructured":"Sharon, T. (2017). Self-tracking for health and the quantified self: Re-articulating autonomy, solidarity, and authenticity in an age of personalized healthcare. Philosophy & Technology, 30, 93\u2013121. https:\/\/doi.org\/10.1007\/s13347-016-0215-5","journal-title":"Philosophy & Technology"},{"key":"9672_CR63","doi-asserted-by":"publisher","first-page":"633","DOI":"10.1007\/s11948-011-9278-y","volume":"18","author":"A Spahn","year":"2012","unstructured":"Spahn, A. (2012). And lead us (not) into persuasion\u2026 persuasive technology and the ethics of communication. Science and Engineering Ethics, 18, 633\u2013650. https:\/\/doi.org\/10.1007\/s11948-011-9278-y","journal-title":"Science and Engineering Ethics"},{"issue":"5","key":"9672_CR64","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1017\/s0140525x00003435","volume":"23","author":"KE Stanovich","year":"2000","unstructured":"Stanovich, K. E., & West, R. F. (2000). Individual difference in reasoning: implications for the rationality debate? Behavioral and Brain Sciences, 23(5), 645\u2013726. https:\/\/doi.org\/10.1017\/s0140525x00003435.","journal-title":"Behavioral and Brain Sciences"},{"issue":"4","key":"9672_CR65","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1027\/2151-2604\/a000222","volume":"223","author":"C Steindl","year":"2015","unstructured":"Steindl, C., Jonas, E., Sittenthaler, S., Traut-Mattausch, E., & Greenberg, J. (2015). Understanding psychological reactance. Zeitschrift f\u00fcr Psychologie, 223(4), 205\u2013214. https:\/\/doi.org\/10.1027\/2151-2604\/a000222.","journal-title":"Zeitschrift f\u00fcr Psychologie"},{"key":"9672_CR66","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1007\/s13347-019-00376-5","volume":"34","author":"LS Sullivan","year":"2019","unstructured":"Sullivan, L. S., & Reiner, P. (2019). Digital wellness and persuasive technologies. Philosophy & Technology, 34, 413\u2013424. https:\/\/doi.org\/10.1007\/s13347-019-00376-5","journal-title":"Philosophy & Technology"},{"key":"9672_CR67","doi-asserted-by":"publisher","DOI":"10.14763\/2019.2.1410","author":"D Susser","year":"2019","unstructured":"Susser, D., Roessler, B., & Nissenbaum, H. (2019). Technology, autonomy, and manipulation. Internet Policy Review. https:\/\/doi.org\/10.14763\/2019.2.1410","journal-title":"Internet Policy Review"},{"key":"9672_CR68","volume-title":"Nudge","author":"RH Thaler","year":"2008","unstructured":"Thaler, R. H., & Sunstein, C. R. (2008). Nudge. Yale University Press."},{"key":"9672_CR69","unstructured":"The Consumer Protection from Unfair Trading Regulations 2008 (2008). Queen\u2019s printer of acts of parliament. Retrieved March 23, 2022 from https:\/\/www.legislation.gov.uk\/uksi\/2008\/1277\/contents\/made"},{"key":"9672_CR70","doi-asserted-by":"publisher","unstructured":"Urban, T., Degeling, M., Holz, T., & Pohlmann, N. (2020). Beyond the front page: measuring third party dynamics in the field. Proceedings of The Web Conference 2020 https:\/\/doi.org\/10.1145\/3366423.3380203","DOI":"10.1145\/3366423.3380203"},{"key":"9672_CR71","doi-asserted-by":"publisher","unstructured":"Utz, C., Degeling, M., Fahl, S., Schaub, F., & Holz, T. (2019). (Un)informed consent: Studying GDPR consent notices in the field. ACM SIGSAC Conference on Computer and Communications Security (CCS \u201919), London, United Kingdom. https:\/\/doi.org\/10.1145\/3319535.3354212","DOI":"10.1145\/3319535.3354212"},{"issue":"4157","key":"9672_CR72","doi-asserted-by":"publisher","first-page":"1124","DOI":"10.1126\/science.185.4157.1124","volume":"185","author":"A Tversky","year":"1974","unstructured":"Tversky, A., & Kahneman, D. (1974). Judgment under uncertainty: Heuristics and biases. Science, 185(4157), 1124\u20131131. https:\/\/doi.org\/10.1126\/science.185.4157.1124","journal-title":"Science"},{"issue":"4481","key":"9672_CR73","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1126\/science.7455683","volume":"211","author":"A Tversky","year":"1981","unstructured":"Tversky, A., & Kahneman, D. (1981). The framing of decisions and the psychology of choice. Science, 211(4481), 453\u2013458. https:\/\/doi.org\/10.1126\/science.7455683.","journal-title":"Science"},{"issue":"3","key":"9672_CR74","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/s11569-009-0077-8","volume":"3","author":"PP Verbeek","year":"2009","unstructured":"Verbeek, P. P. (2009). Ambient intelligence and persuasive technology: The blurring boundaries between human and technology. Nanoethics, 3(3), 231\u2013242. https:\/\/doi.org\/10.1007\/s11569-009-0077-8","journal-title":"Nanoethics"},{"key":"9672_CR75","unstructured":"von Neumann, J., & Morgenstern, O. (1944). Theory of Games and Economic Behavior. Princeton University Press."},{"issue":"1","key":"9672_CR76","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1017\/bpp.2018.5","volume":"4","author":"A Vugts","year":"2020","unstructured":"Vugts, A., van den Hoven, M., de Vet, E., & Verweij, M. F. (2020). How autonomy is understood in discussions on the ethics of nudging. Behavioural Public Policy, 4(1), 108\u2013123. https:\/\/doi.org\/10.1017\/bpp.2018.5.","journal-title":"Behavioural Public Policy"},{"key":"9672_CR77","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.smhl.2018.05.002","volume":"7\u20138","author":"Y Wang","year":"2018","unstructured":"Wang, Y., Wu, L., Lange, J., Fadhil, A., & Reiterer, H. (2018). Persuasive technology in reducing prolonged sedentary behavior at work: A systematic review. Smart Health, 7\u20138, 19\u201330. https:\/\/doi.org\/10.1016\/j.smhl.2018.05.002","journal-title":"Smart Health"},{"key":"9672_CR78","unstructured":"Warner, M., & Fischer, D. (2019, April 09). Senators introduce bipartisan legislation to ban manipulative \u201cDark Patterns\u201d. Retrieved March 22, 2022 from https:\/\/www.fischer.senate.gov\/public\/index.cfm\/2019\/4\/senators-introduce-bipartisan-legislation-to-ban-manipulative-dark-patterns"},{"issue":"4","key":"9672_CR79","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1111\/jopy.12120","volume":"83","author":"TEA Waters","year":"2014","unstructured":"Waters, T. E. A., & Fivush, R. (2014). Relations between narrative coherence, identity, and psychological well-being in emerging adulthood. Journal of Personality, 83(4), 441\u2013451. https:\/\/doi.org\/10.1111\/jopy.12120","journal-title":"Journal of Personality"},{"key":"9672_CR80","doi-asserted-by":"publisher","unstructured":"Wenker, K. (2022). A systematic literature review on persuasive technology at the workplace. ArXiv. https:\/\/doi.org\/10.48550\/arXiv.2201.00329.","DOI":"10.48550\/arXiv.2201.00329"},{"key":"9672_CR81","doi-asserted-by":"publisher","unstructured":"Westin, F., & Chiasson, S. (2021). \u201cIt\u2019s so difficult to sever that connection\u201d: The role of FoMO in users\u2019 reluctant privacy behaviours. CHI Conference on Human Factors in Computing Systems (CHI \u201921), Yokohama, Japan. https:\/\/doi.org\/10.1145\/3411764.3445104","DOI":"10.1145\/3411764.3445104"},{"key":"9672_CR82","doi-asserted-by":"publisher","DOI":"10.1080\/10508422.2022.2082969","author":"M Wieczorek","year":"2022","unstructured":"Wieczorek, M., O\u2019Brolchain, F., Saghai, Y., & Gordijn, B. (2022). The ethics of self-tracking. A comprehensive review of the literature. Ethics & Behavior. https:\/\/doi.org\/10.1080\/10508422.2022.2082969.","journal-title":"Ethics & Behavior"},{"key":"9672_CR83","doi-asserted-by":"publisher","unstructured":"Woodward, J. D. (1997). Biometrics: privacy\u2019s foe or privacy\u2019s friend?. Proceedings of the IEEE, 85(9), 1480\u20131492. https:\/\/doi.org\/10.1109\/5.628723","DOI":"10.1109\/5.628723"},{"key":"9672_CR84","doi-asserted-by":"publisher","unstructured":"Wu, Q., Sang, Y., Wang, D., & Lu, Z. (2021). Malicious selling strategies in livestream shopping: A case study of Alibaba\u2019s Taobao and ByteDance\u2019s Douyin. ArXiv. https:\/\/doi.org\/10.48550\/arXiv.2111.10491.","DOI":"10.48550\/arXiv.2111.10491"},{"key":"9672_CR85","first-page":"45","volume":"12","author":"R Yamazaki","year":"2018","unstructured":"Yamazaki, R., Nishio, S., Ishiguro, H., & Kase, H. (2018). Use of robotic media as persuasive technology and its ethical implications in care settings. Journal of Philosophy and Ethics in Health Care and Medicine, 12, 45\u201358.","journal-title":"Journal of Philosophy and Ethics in Health Care and Medicine"},{"key":"9672_CR86","volume-title":"Dark patterns in the design of games. Foundations of digital games (FDG \u201913)","author":"JP Zagal","year":"2013","unstructured":"Zagal, J. P., Bj\u00f6rk, S., & Lewis, C. (2013). Dark patterns in the design of games. Foundations of digital games (FDG \u201913). Society for the Advancement of the Science of Digital Games."},{"key":"9672_CR87","volume-title":"The age of surveillance capitalism: The fight for a human future at the new frontier of power","author":"S Zuboff","year":"2019","unstructured":"Zuboff, S. (2019). The age of surveillance capitalism: The fight for a human future at the new frontier of power. PublicAffairs."}],"container-title":["Ethics and Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-022-09672-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10676-022-09672-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10676-022-09672-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,15]],"date-time":"2023-03-15T21:13:08Z","timestamp":1678914788000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10676-022-09672-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12]]},"references-count":87,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["9672"],"URL":"https:\/\/doi.org\/10.1007\/s10676-022-09672-9","relation":{},"ISSN":["1388-1957","1572-8439"],"issn-type":[{"value":"1388-1957","type":"print"},{"value":"1572-8439","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12]]},"assertion":[{"value":"5 December 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}],"article-number":"52"}}