{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,5]],"date-time":"2026-04-05T09:46:22Z","timestamp":1775382382607,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":55,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,4,21]],"date-time":"2020-04-21T00:00:00Z","timestamp":1587427200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/N510129\/1"],"award-info":[{"award-number":["EP\/N510129\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100004439","name":"William and Flora Hewlett Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100004439","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100007515","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1639994: Transparency Bridges"],"award-info":[{"award-number":["1639994: Transparency Bridges"]}],"id":[{"id":"10.13039\/100007515","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002739","name":"Aarhus Universitets Forskningsfond","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002739","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001825","name":"Danish Agency for Science and Higher Education","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001825","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,4,21]]},"DOI":"10.1145\/3313831.3376321","type":"proceedings-article","created":{"date-parts":[[2020,5,27]],"date-time":"2020-05-27T13:14:48Z","timestamp":1590585288000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":284,"title":["Dark Patterns after the GDPR: Scraping Consent Pop-ups and Demonstrating their Influence"],"prefix":"10.1145","author":[{"given":"Midas","family":"Nouwens","sequence":"first","affiliation":[{"name":"Aarhus University &amp; Massachusetts Institute of Technology, Aarhus, Denmark"}]},{"given":"Ilaria","family":"Liccardi","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, MA, USA"}]},{"given":"Michael","family":"Veale","sequence":"additional","affiliation":[{"name":"University College London, London, United Kingdom"}]},{"given":"David","family":"Karger","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, MA, USA"}]},{"given":"Lalana","family":"Kagal","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, MA, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,4,23]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.22"},{"key":"e_1_3_2_1_2_1","unstructured":"Advocate General Szupunar. 2019. Case C-673\/17 Planet49 GmbH v Bundesverband der Verbraucherzentralen und Verbraucherverb\u00e4nde -- Verbraucherzentrale Bundesverband e.V. ECLI:EU:C:2019:246 Opinion of the Advocate General. (2019)."},{"key":"e_1_3_2_1_3_1","volume-title":"Adtech Insights -","year":"2019","unstructured":"Adzerk. 2019. Adtech Insights - August 2019 Report. (2019). https:\/\/adzerk.com\/assets\/reports\/AdTechInsights_Aug2019.pdf"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of international symposium on human aspects of information security & assurance (HAISA 2011)","author":"Angulo Julio","year":"2011","unstructured":"Julio Angulo, Simone Fischer-H\u00fcbner, Tobias Pulls, and Erik W\u00e4stlund. 2011. Towards Usable Privacy Policy Display & Management for PrimeLife. S. M. Furnell, & N. L. Clarke (Eds.), Proceedings of international symposium on human aspects of information security & assurance (HAISA 2011) (2011), 108 -- 117."},{"key":"e_1_3_2_1_5_1","volume-title":"Guidelines on Consent under Regulation 2016\/679 (WP259 rev.01)","author":"Working Party Article","unstructured":"Article 29 Working Party. 2018. Guidelines on Consent under Regulation 2016\/679 (WP259 rev.01). European Union."},{"key":"e_1_3_2_1_6_1","unstructured":"Autoriteit Persoonsgegevens. 2019. Hoe Legt de AP de Juridische Normen Rond Cookiewalls Uit? AP Den Haag."},{"key":"e_1_3_2_1_7_1","first-page":"1","article-title":"Towards Usable Privacy Policy Display & Management for PrimeLife","volume":"4","author":"Meinert David","year":"2006","unstructured":"Meinert David B., Dane K. Peterson, John R. Criswell, and Martin D. Crossland. 2006. Towards Usable Privacy Policy Display & Management for PrimeLife. Journal of Electronic Commerce in Organizations (JECO) 4, 1 (2006), 1--17.","journal-title":"Journal of Electronic Commerce in Organizations (JECO)"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0038"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2019.1637447"},{"key":"e_1_3_2_1_10_1","volume-title":"Objects of Intense Feeling: The Case of the Twitter API : Computational Culture. Computational Culture: A Journal of Software Studies 3","author":"Bucher Tania","year":"2013","unstructured":"Tania Bucher. 2013. Objects of Intense Feeling: The Case of the Twitter API : Computational Culture. Computational Culture: A Journal of Software Studies 3 (2013). http:\/\/computationalculture.net\/objects-of-intensefeeling-the-case-of-the-twitter-api\/"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2010.84"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1017\/glj.2019.56"},{"key":"e_1_3_2_1_13_1","unstructured":"Commission nationale de l'informatique et des libert\u00e9s (CNIL). 2019. D\u00e9lib\u00e9ration n\u00b0 2019-093 du 4 juillet 2019 portant adoption de lignes directrices relatives \u00e0 l'application de l'article 82 de la loi du 6 janvier 1978 modifi\u00e9e aux op\u00e9rations de lecture ou \u00e9criture dans le terminal d'un utilisateur (notamment aux cookies et autres traceurs) (rectificatif). (2019)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772719"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics"},{"key":"e_1_3_2_1_16_1","first-page":"629","article-title":"Case C-49\/17 Fashion ID GmbH & Co.KG v Verbraucherzentrale NRW eV","volume":"2019","author":"European Union Court","year":"2019","unstructured":"Court of Justice of the European Union. 2019a. Case C-49\/17 Fashion ID GmbH & Co.KG v Verbraucherzentrale NRW eV. ECLI:EU:C:2019:629. (2019).","journal-title":"ECLI:EU:C"},{"key":"e_1_3_2_1_17_1","first-page":"801","article-title":"Case C-673\/17 Planet49 GmbH v Bundesverband der Verbraucherzentralen und Verbraucherverb\u00e4nde -- Verbraucherzentrale Bundesverband e.V","volume":"2019","author":"European Union Court","year":"2019","unstructured":"Court of Justice of the European Union. 2019b. Case C-673\/17 Planet49 GmbH v Bundesverband der Verbraucherzentralen und Verbraucherverb\u00e4nde -- Verbraucherzentrale Bundesverband e.V. ECLI:EU:C:2019:801. (2019).","journal-title":"ECLI:EU:C"},{"key":"e_1_3_2_1_18_1","volume-title":"Web privacy with P3P","author":"Cranor Lorrie","unstructured":"Lorrie Cranor. 2002. Web privacy with P3P. O'Reilly Media, Sebastopol, CA."},{"key":"e_1_3_2_1_19_1","first-page":"273","article-title":"Necessary but Not Sufficient: Standardized Mechanisms for Privacy Notice and Choice The Economics of Privacy","volume":"10","author":"Cranor Lorrie Faith","year":"2012","unstructured":"Lorrie Faith Cranor. 2012. Necessary but Not Sufficient: Standardized Mechanisms for Privacy Notice and Choice The Economics of Privacy. Journal on Telecommunications and High Technology Law 10, 2 (2012), 273--308.","journal-title":"Journal on Telecommunications and High Technology Law"},{"key":"e_1_3_2_1_20_1","volume-title":"Warner Deb Fisher","author":"Mark","year":"2019","unstructured":"Mark R. Warner Deb Fisher. 2019. Deceptive Experiences To Online Users Reduction (DETOUR) Act. https:\/\/www.scribd.com\/document\/405606873\/Detour-Act-Final"},{"key":"e_1_3_2_1_21_1","volume-title":"We Value Your Privacy... Now Take Some Cookies: Measuring the GDPR's Impact on Web Privacy. arXiv preprint arXiv:1808.05096","author":"Degeling Martin","year":"2018","unstructured":"Martin Degeling, Christine Utz, Christopher Lentzsch, Henry Hosseini, Florian Schaub, and Thorsten Holz. 2018. We Value Your Privacy... Now Take Some Cookies: Measuring the GDPR's Impact on Web Privacy. arXiv preprint arXiv:1808.05096 (2018)."},{"key":"e_1_3_2_1_22_1","volume-title":"EDPS Opinion on the Proposal for a Regulation on Privacy and Electronic Communications (ePrivacy Regulation)","author":"Protection Supervisor European Data","unstructured":"European Data Protection Supervisor. EDPS Opinion on the Proposal for a Regulation on Privacy and Electronic Communications (ePrivacy Regulation), Opinion 6\/2017. EDPS, Brussels, BE."},{"key":"e_1_3_2_1_23_1","unstructured":"European Union. 1995. Directive 95\/46\/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data OJ 1995 L 281\/31. (1995)."},{"key":"e_1_3_2_1_24_1","unstructured":"European Union. 2002. Directive 2002\/58\/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications) OJ L 201. (2002)."},{"key":"e_1_3_2_1_25_1","unstructured":"European Union. 2016. Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data and repealing Directive 95\/46\/EC (General Data Protection Regulation) OJ 2016 L 119\/1. (2016)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1541948.1541999"},{"key":"e_1_3_2_1_27_1","unstructured":"Forbrukerr\u00e5det. 2019. Deceived by Design: How tech companies use dark patterns to discourage us from exercising our rights to privacy. (2019). https:\/\/fil.forbrukerradet.no\/wp-content\/uploads\/2018\/06\/2018-06--27-deceived-by-design-final.pdf"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174108"},{"key":"e_1_3_2_1_29_1","unstructured":"Information Commissioner's Office. 2019a. Guidance on the Use of Cookies and Similar Technologies. ICO Wilmslow Cheshire."},{"key":"e_1_3_2_1_30_1","unstructured":"Information Commissioner's Office. 2019b. Update Report into Adtech and Real Time Bidding. ICO Wilmslow Cheshire."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/985692.985752"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1093\/idpl\/ipw019"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572538"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1093\/ijlit"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2014.2346248"},{"key":"e_1_3_2_1_36_1","first-page":"84","article-title":"Responsibility for Data Protection in a Networked World: On the Question of the Controller, Effective and Complete Protection and Its Application to Data Access Rights in Europe","volume":"10","author":"Mahieu Rene","year":"2019","unstructured":"Rene Mahieu, Joris van Hoboken, and Hadi Asghari. 2019. Responsibility for Data Protection in a Networked World: On the Question of the Controller, Effective and Complete Protection and Its Application to Data Access Rights in Europe. Journal of Intellectual Property, Information Technology and Electronic Commerce Law 10, 1 (2019), 84--104.","journal-title":"Journal of Intellectual Property, Information Technology and Electronic Commerce Law"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359183"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","unstructured":"C\u00e9lestin Matte Nataliia Bielova and Cristiana Santos. 2019. Do Cookie Banners Respect my Choice? Measuring Legal Compliance of Banners from IAB Europe's Transparency and Consent Framework (Under submission). https:\/\/arxiv.org\/abs\/1911.09964v1","DOI":"10.1109\/SP40000.2020.00076"},{"key":"e_1_3_2_1_39_1","unstructured":"John McCarthy. 2019. Over 90% of users consent to GDPR requests says Quantcast after enabling 1bn of them. https:\/\/www.thedrum.com\/news\/2018\/07\/31\/over-90-users-consentgdpr-requests-says-quantcast-after-enabling-1bn-them. (2019)."},{"key":"e_1_3_2_1_40_1","first-page":"540","article-title":"The cost of reading privacy policies","volume":"4","author":"McDonald A. M.","year":"2008","unstructured":"A. M. McDonald and L. F. Cranor. 2008. The cost of reading privacy policies. I\/S: A Journal of Law and Policy for the Information Society 4 (2008), 540 -- 565.","journal-title":"I\/S: A Journal of Law and Policy for the Information Society"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1162\/DAED_a_00113"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2018.1486870"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357285"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329806"},{"key":"e_1_3_2_1_45_1","volume-title":"Eleventh Symposium On Usable Privacy and Security (SOUPS","author":"Schaub Florian","year":"2015","unstructured":"Florian Schaub, Rebecca Balebako, Adam L Durity, and Lorrie Faith Cranor. 2015. A design space for effective privacy notices. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015). 1--17."},{"key":"e_1_3_2_1_46_1","volume-title":"Retrieved","author":"Singer Natasha","year":"2016","unstructured":"Natasha Singer. 2016. When Websites Won't Take No for an Answer. New York Times (15 5 2016). Retrieved Sept 19, 2019 from https:\/\/www.nytimes.com\/2016\/05\/15\/technology\/personaltech\/when-websites-wont-take-no-foran-answer.html?mcubz=0&_r=0"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313524"},{"key":"e_1_3_2_1_48_1","unstructured":"European Data Protection Supervisor. 2018. EDPS Opinion on the legislative package \"A New Deal for Consumers\". https:\/\/edps.europa.eu\/sites\/edp\/files\/publication\/1810-05_opinion_consumer_law_en.pdf"},{"key":"e_1_3_2_1_49_1","volume-title":"Nudge: Improving decisions about health, wealth, and happiness","author":"Thaler Richard H","year":"2009","unstructured":"Richard H Thaler and Cass R Sunstein. 2009. Nudge: Improving decisions about health, wealth, and happiness. Penguin."},{"key":"e_1_3_2_1_50_1","first-page":"11","article-title":"Cookie consent revisited","volume":"19","author":"Tobin Oisin","year":"2019","unstructured":"Oisin Tobin. 2019. Cookie consent revisited. Privacy and Data Protection 19 (2019), 11. Issue 5.","journal-title":"Privacy and Data Protection"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0023"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354212"},{"key":"e_1_3_2_1_53_1","volume-title":"Data Protection Law in the EU: Roles, Responsibilities and Liability","author":"Alsenoy Brendan Van","unstructured":"Brendan Van Alsenoy. 2019. Data Protection Law in the EU: Roles, Responsibilities and Liability. Intersentia, Cambridge."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/948005.948057"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.21552\/edpl\/2017\/3\/9"}],"event":{"name":"CHI '20: CHI Conference on Human Factors in Computing Systems","location":"Honolulu HI USA","acronym":"CHI '20","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3313831.3376321","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3313831.3376321","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:32:56Z","timestamp":1750199576000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3313831.3376321"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,21]]},"references-count":55,"alternative-id":["10.1145\/3313831.3376321","10.1145\/3313831"],"URL":"https:\/\/doi.org\/10.1145\/3313831.3376321","relation":{},"subject":[],"published":{"date-parts":[[2020,4,21]]},"assertion":[{"value":"2020-04-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}