{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T23:23:09Z","timestamp":1776122589071,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":92,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,4,21]],"date-time":"2020-04-21T00:00:00Z","timestamp":1587427200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Schweizerischer Nationalfonds zur F\u00f6rderung der Wissenschaftlichen Forschung","award":["PP00P2_170529"],"award-info":[{"award-number":["PP00P2_170529"]}]},{"name":"Digital Society Initiative, Fellow program, University of Zurich","award":["2019"],"award-info":[{"award-number":["2019"]}]},{"name":"Swiss National Science Foundation","award":["PZ00P2_186090"],"award-info":[{"award-number":["PZ00P2_186090"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,4,21]]},"DOI":"10.1145\/3313831.3376600","type":"proceedings-article","created":{"date-parts":[[2020,5,27]],"date-time":"2020-05-27T17:16:51Z","timestamp":1590599811000},"page":"1-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":221,"title":["UI Dark Patterns and Where to Find Them"],"prefix":"10.1145","author":[{"given":"Linda","family":"Di Geronimo","sequence":"first","affiliation":[{"name":"University of Z\u00fcrich, Z\u00fcrich, Switzerland"}]},{"given":"Larissa","family":"Braz","sequence":"additional","affiliation":[{"name":"University of Z\u00fcrich, Z\u00fcrich, Switzerland"}]},{"given":"Enrico","family":"Fregnan","sequence":"additional","affiliation":[{"name":"University of Z\u00fcrich, Z\u00fcrich, Switzerland"}]},{"given":"Fabio","family":"Palomba","sequence":"additional","affiliation":[{"name":"University of Z\u00fcrich, Z\u00fcrich, Switzerland"}]},{"given":"Alberto","family":"Bacchelli","sequence":"additional","affiliation":[{"name":"University of Z\u00fcrich, Z\u00fcrich, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2020,4,23]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"https:\/\/www.amazon.com","year":"2019","unstructured":"2019a. Amazon. (2019). https:\/\/www.amazon.com"},{"key":"e_1_3_2_2_2_1","volume-title":"https:\/\/www.amazon.com\/Amazon-Photos\/b?ie=UTF8&node=13234696011","author":"Photos Amazon","year":"2019","unstructured":"2019b. Amazon Photos. (2019). https:\/\/www.amazon.com\/Amazon-Photos\/b?ie=UTF8&node=13234696011"},{"key":"e_1_3_2_2_3_1","unstructured":"2019. ApowerREC Google Play page. (2019). https:\/\/play.google.com\/store\/apps\/details?id=com.apowersoft.apowerrec&hl=en"},{"key":"e_1_3_2_2_4_1","unstructured":"2019. Barcode Scanner Google Play page. (2019). https:\/\/play.google.com\/store\/apps\/details?id=com.lego.bricksmore"},{"key":"e_1_3_2_2_5_1","volume-title":"Google Play page.","year":"2019","unstructured":"2019. Call Free - Free Call, Google Play page. (2019). https:\/\/play.google.com\/store\/apps\/details?id=call.free.international.phone.call"},{"key":"e_1_3_2_2_6_1","volume-title":"https:\/\/figshare.com\/s\/048c984854a59429d0f0","author":"Dataset Experiment","year":"2019","unstructured":"2019. Experiment Dataset. (2019). https:\/\/figshare.com\/s\/048c984854a59429d0f0"},{"key":"e_1_3_2_2_7_1","unstructured":"2019a. Face Reading Google Play page. (2019). https:\/\/play.google.com\/store\/apps\/details?id=app.facereading.signs"},{"key":"e_1_3_2_2_8_1","unstructured":"2019b. FaceApp Google Play page. (2019). https:\/\/play.google.com\/store\/apps\/details?id=io.faceapp&hl=en"},{"key":"e_1_3_2_2_9_1","volume-title":"https:\/\/facebook.com","year":"2019","unstructured":"2019. Facebook. (2019). https:\/\/facebook.com"},{"key":"e_1_3_2_2_10_1","volume-title":"https:\/\/www.mozilla.org\/en-US\/firefox\/new\/","year":"2019","unstructured":"2019. Firefox. (2019). https:\/\/www.mozilla.org\/en-US\/firefox\/new\/"},{"key":"e_1_3_2_2_11_1","volume-title":"https:\/\/gmail.com","year":"2019","unstructured":"2019. Gmail. (2019). https:\/\/gmail.com"},{"key":"e_1_3_2_2_12_1","unstructured":"2019. Google Play Store. (2019). https:\/\/play.google.com\/store"},{"key":"e_1_3_2_2_13_1","volume-title":"https:\/\/www.instagram.com","year":"2019","unstructured":"2019. Instagram. (2019). https:\/\/www.instagram.com"},{"key":"e_1_3_2_2_14_1","unstructured":"2019. Lego Juniors Google Play page. (2019). https:\/\/play.google.com\/store\/apps\/details?id=com.lego.bricksmore"},{"key":"e_1_3_2_2_15_1","volume-title":"https:\/\/netflix.com","year":"2019","unstructured":"2019. Netflix. (2019). https:\/\/netflix.com"},{"key":"e_1_3_2_2_16_1","volume-title":"https:\/\/oneplus.com\/5","author":"One Plus","year":"2019","unstructured":"2019. One Plus 5. (2019). https:\/\/oneplus.com\/5"},{"key":"e_1_3_2_2_17_1","volume-title":"https:\/\/www.reddit.com\/","year":"2019","unstructured":"2019. Reddit. (2019). https:\/\/www.reddit.com\/"},{"key":"e_1_3_2_2_18_1","unstructured":"2019. Roblox Google Play page. (2019). https:\/\/play.google.com\/store\/apps\/details?id=com.roblox.client"},{"key":"e_1_3_2_2_19_1","volume-title":"https:\/\/play.google.com\/store\/apps\/details?id=com.romwe","year":"2019","unstructured":"2019. Romwe. (2019). https:\/\/play.google.com\/store\/apps\/details?id=com.romwe"},{"key":"e_1_3_2_2_20_1","volume-title":"https:\/\/sensortower.com","year":"2019","unstructured":"2019. SensorTower. (2019). https:\/\/sensortower.com"},{"key":"e_1_3_2_2_21_1","volume-title":"https:\/\/snapseed.online","year":"2019","unstructured":"2019. Snapseed. (2019). https:\/\/snapseed.online"},{"key":"e_1_3_2_2_22_1","volume-title":"https:\/\/spotify.com","year":"2019","unstructured":"2019. Spotify. (2019). https:\/\/spotify.com"},{"key":"e_1_3_2_2_23_1","unstructured":"2019. Tag With Ryan Google Play Page. (2019). https:\/\/www.amazon.com\/Amazon-Photos\/b?ie=UTF8&node=13234696011"},{"key":"e_1_3_2_2_24_1","unstructured":"2019. Talkatone Google Play page. (2019). https:\/\/play.google.com\/store\/apps\/details?id=com.talkatone.android"},{"key":"e_1_3_2_2_25_1","volume-title":"https:\/\/twitter.com","year":"2019","unstructured":"2019. Twitter. (2019). https:\/\/twitter.com"},{"key":"e_1_3_2_2_26_1","volume-title":"https:\/\/www.wish.com","year":"2019","unstructured":"2019. Wish. (2019). https:\/\/www.wish.com"},{"key":"e_1_3_2_2_27_1","volume-title":"Social Media & Technology Overview","author":"Anderson Monica","year":"2018","unstructured":"Monica Anderson and Jingjing Jiang. 2018. Teens, Social Media & Technology Overview 2018. Technical Report. Pew Research Center, https:\/\/www.pewinternet.org\/2018\/05\/31\/teens-social-media-technology-2018\/\/."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2013.10.004"},{"key":"e_1_3_2_2_29_1","volume-title":"Neuromarketing: the hope and hype of neuroimaging in business. Nature reviews neuroscience 11, 4","author":"Ariely Dan","year":"2010","unstructured":"Dan Ariely and Gregory S Berns. 2010. Neuromarketing: the hope and hype of neuroimaging in business. Nature reviews neuroscience 11, 4 (2010), 284."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466451"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979336"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2012.77"},{"key":"e_1_3_2_2_33_1","unstructured":"Harry Brignull. 2019. Dark Patterns. Technical Report. Harry Brignull Dark Patterns website https:\/\/www.darkpatterns.org\/."},{"key":"e_1_3_2_2_34_1","volume-title":"What works in e-commerce-a meta-analysis of 6700 online experiments","author":"Browne Will","year":"2017","unstructured":"Will Browne and Mike Swarbrick Jones. 2017. What works in e-commerce-a meta-analysis of 6700 online experiments. Qubit Digital Ltd 21 (2017)."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772719"},{"key":"e_1_3_2_2_36_1","volume-title":"Media use and brain development during adolescence. Nature communications 9, 1","author":"Crone Eveline A","year":"2018","unstructured":"Eveline A Crone and Elly A Konijn. 2018. Media use and brain development during adolescence. Nature communications 9, 1 (2018), 588."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702150"},{"key":"e_1_3_2_2_38_1","volume-title":"biases, and rational decision-making in the human brain. Science 313, 5787","author":"Martino Benedetto De","year":"2006","unstructured":"Benedetto De Martino, Dharshan Kumaran, Ben Seymour, and Raymond J Dolan. 2006. Frames, biases, and rational decision-making in the human brain. Science 313, 5787 (2006), 684--687."},{"key":"e_1_3_2_2_39_1","volume-title":"The theory of decision making. Psychological bulletin 51, 4","author":"Edwards Ward","year":"1954","unstructured":"Ward Edwards. 1954. The theory of decision making. Psychological bulletin 51, 4 (1954), 380."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3170427.3188553"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3311927.3323136"},{"key":"e_1_3_2_2_42_1","volume-title":"Value sensitive design and information systems. The handbook of information and computer ethics","author":"Friedman Batya","year":"2008","unstructured":"Batya Friedman, Peter H Kahn, and Alan Borning. 2008. Value sensitive design and information systems. The handbook of information and computer ethics (2008), 69--101."},{"key":"e_1_3_2_2_43_1","volume-title":"Wichansky","author":"Goldberg Joseph H.","year":"2003","unstructured":"Joseph H. Goldberg and Anna M. Wichansky. 2003. Chapter 23 - Eye Tracking in Usability Evaluation: A Practitioner's Guide. In The Mind's Eye, J. Hy\u00f6n\u00e4, R. Radach, and H. Deubel (Eds.). North-Holland, 493 -- 516."},{"key":"e_1_3_2_2_44_1","volume-title":"Proceedings of the Conference on Human Factors in Computing Systems.","author":"Gray Colin M.","unstructured":"Colin M. Gray, Yubo Kou, Bryan Battles, Joseph Hoggatt, and Austin L. Toombs. 2018. The Dark (Patterns) Side of UX Design. In Proceedings of the Conference on Human Factors in Computing Systems."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2598510.2598541"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557364"},{"key":"e_1_3_2_2_47_1","unstructured":"Shipra Gupta. 2013. The psychological effects of perceived scarcity on consumers buying behavior. (2013)."},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1186\/2194-0827-1-1"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1038\/nrn730"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2010.11.019"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.imavis.2004.03.013"},{"key":"e_1_3_2_2_53_1","volume-title":"Designing the Star user interface. Byte 7","author":"Kimball Ralph","year":"1982","unstructured":"Ralph Kimball and B Verplank E Harslem. 1982. Designing the Star user interface. Byte 7, 1982 (1982), 242--282."},{"key":"e_1_3_2_2_54_1","volume-title":"Gaze and eye contact: a research review. Psychological bulletin 100, 1","author":"Kleinke Chris L","year":"1986","unstructured":"Chris L Kleinke. 1986. Gaze and eye contact: a research review. Psychological bulletin 100, 1 (1986), 78."},{"key":"e_1_3_2_2_55_1","volume-title":"Smart things: ubiquitous computing user experience design","author":"Kuniavsky Mike","unstructured":"Mike Kuniavsky. 2010. Smart things: ubiquitous computing user experience design. Elsevier."},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/HRI.2019.8673274"},{"key":"e_1_3_2_2_57_1","volume-title":"Proceedings of the International Workshop on the Interplay between User Experience (UX) Evaluation and System Development (I-UxSED). 49--54","author":"L\u00e1rusd\u00f3ttir Marta Krist\u00edn","year":"2012","unstructured":"Marta Krist\u00edn L\u00e1rusd\u00f3ttir, \u00c5sa Cajander, and Jan Gulliksen. 2012. The big picture of UX is missing in Scrum projects. In Proceedings of the International Workshop on the Interplay between User Experience (UX) Evaluation and System Development (I-UxSED). 49--54."},{"key":"e_1_3_2_2_59_1","volume-title":"Public Law Working Paper 719","author":"Luguri Jamie","year":"2019","unstructured":"Jamie Luguri and Lior Strahilevitz. 2019. Shining a Light on Dark Patterns. U of Chicago, Public Law Working Paper 719 (2019)."},{"key":"e_1_3_2_2_60_1","volume-title":"Proceedings of the Conference on Human Factors in Computing Systems. 4011--4016","author":"Lukanov Kristiyan","unstructured":"Kristiyan Lukanov, Horia A. Maior, and Max L. Wilson. 2016. Using fNIRS in Usability Testing: Understanding the Effect of Web Form Layout on Mental Workload. In Proceedings of the Conference on Human Factors in Computing Systems. 4011--4016."},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2686612.2686684"},{"key":"e_1_3_2_2_62_1","volume-title":"Dark Patterns at Scale: Findings from a Crawl of 11K Shopping Websites. arXiv preprint arXiv:1907.07032","author":"Mathur Arunesh","year":"2019","unstructured":"Arunesh Mathur, Gunes Acar, Michael Friedman, Elena Lucherini, Jonathan Mayer, Marshini Chetty, and Arvind Narayanan. 2019. Dark Patterns at Scale: Findings from a Crawl of 11K Shopping Websites. arXiv preprint arXiv:1907.07032 (2019)."},{"key":"e_1_3_2_2_63_1","volume-title":"Semantic priming: Perspectives from memory and word recognition","author":"McNamara Timothy P","unstructured":"Timothy P McNamara. 2005. Semantic priming: Perspectives from memory and word recognition. Psychology Press."},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300472"},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1002\/cb.252"},{"key":"e_1_3_2_2_66_1","volume-title":"Proceedings of the Conference on Human Factors in Computing Systems.","author":"Nebeling M.","unstructured":"M. Nebeling, M. Speicher, and M. Norrie. 2013. W3Touch: Metrics-based Web Page Adaptation for Touch. In Proceedings of the Conference on Human Factors in Computing Systems."},{"key":"e_1_3_2_2_67_1","unstructured":"Robert Nickerson Mark Austreich and Jamie Eng. 2014. Mobile technology and smartphone apps: A Diffusion of innovations analysis. (2014)."},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/259963.260333"},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/259963.260531"},{"key":"e_1_3_2_2_70_1","volume-title":"Designing Web Usability: The Practice of Simplicity","author":"Nielsen Jakob","unstructured":"Jakob Nielsen. 1999. Designing Web Usability: The Practice of Simplicity. New Riders Publishing."},{"key":"e_1_3_2_2_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/97243.97281"},{"key":"e_1_3_2_2_72_1","volume-title":"Evil by design: Interaction design to lead us into temptation","author":"Nodder C.","unstructured":"C. Nodder. 2013. Evil by design: Interaction design to lead us into temptation. John Wiley & Sons."},{"key":"e_1_3_2_2_73_1","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.02428"},{"key":"e_1_3_2_2_74_1","doi-asserted-by":"publisher","DOI":"10.1542\/peds.2011-0054"},{"key":"e_1_3_2_2_75_1","article-title":"Text Advertising Blindness: The New Banner Blindness","volume":"6","author":"Owens Justin W.","year":"2011","unstructured":"Justin W. Owens, Barbara S. Chaparro, and Evan M. Palmer. 2011. Text Advertising Blindness: The New Banner Blindness? J. Usability Studies 6, 3 (2011), 12:172--12:197.","journal-title":"J. Usability Studies"},{"key":"e_1_3_2_2_76_1","doi-asserted-by":"publisher","DOI":"10.5555\/2817709.2817711"},{"key":"e_1_3_2_2_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786567.2787135"},{"key":"e_1_3_2_2_78_1","volume-title":"Values at play in digital games","author":"Paul Christopher A","year":"2016","unstructured":"Christopher A Paul. 2016. Values at play in digital games. New Media & Society (2016)."},{"key":"e_1_3_2_2_80_1","unstructured":"Jenny Preece Yvonne Rogers Helen Sharp David Benyon Simon Holland and Tom Carey. 1994. Human-Computer Interaction. Addison-Wesley Longman Ltd."},{"key":"e_1_3_2_2_81_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICRIIS.2013.6716765"},{"key":"e_1_3_2_2_82_1","volume-title":"Persuasive Design: Fringes and Foundations. In Persuasive Technology.","author":"Redstr\u00f6m J.","year":"2006","unstructured":"J. Redstr\u00f6m. 2006. Persuasive Design: Fringes and Foundations. In Persuasive Technology."},{"key":"e_1_3_2_2_83_1","doi-asserted-by":"crossref","unstructured":"Phoebe Sengers Kirsten Boehner Shay David and Joseph 'Jofish' Kaye. 2005. Reflective Design. In CC.","DOI":"10.1145\/1094562.1094569"},{"key":"e_1_3_2_2_84_1","volume-title":"Proceedings of the Conference on Computer-Supported Cooperative Work and Social Computing.","author":"Shilton K.","unstructured":"K. Shilton, J. A. Koepfler, and K. R. Fleischmann. 2014. How to See Values in Social Computing: Methods for Studying Values Dimensions. In Proceedings of the Conference on Computer-Supported Cooperative Work and Social Computing."},{"key":"e_1_3_2_2_85_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-016-3059-0"},{"key":"e_1_3_2_2_89_1","volume-title":"The neural basis of loss aversion in decision-making under risk. Science 315, 5811","author":"Tom Sabrina M","year":"2007","unstructured":"Sabrina M Tom, Craig R Fox, Christopher Trepel, and Russell A Poldrack. 2007. The neural basis of loss aversion in decision-making under risk. Science 315, 5811 (2007), 515--518."},{"key":"e_1_3_2_2_90_1","volume-title":"Annual Conference-society for technical communication","volume":"53","author":"Tracy Janet Patton","year":"2006","unstructured":"Janet Patton Tracy and Michael J Albers. 2006. Measuring cognitive load to test the usability of web sites. In Annual Conference-society for technical communication, Vol. 53. 256."},{"key":"e_1_3_2_2_91_1","volume-title":"Design for socially responsible behavior: a classification of influence based on intended user experience. Design issues 27, 3","author":"Tromp Nynke","year":"2011","unstructured":"Nynke Tromp, Paul Hekkert, and Peter-Paul Verbeek. 2011. Design for socially responsible behavior: a classification of influence based on intended user experience. Design issues 27, 3 (2011), 3--19."},{"key":"e_1_3_2_2_92_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11948-014-9581-5"},{"key":"e_1_3_2_2_93_1","volume-title":"2017 21st International Conference on System Theory, Control and Computing. 553--557","author":"Ungureanu F.","unstructured":"F. Ungureanu, R. G. Lupu, A. Cadar, and A. Prodan. 2017. Neuromarketing and visual attention study using eye tracking techniques. In 2017 21st International Conference on System Theory, Control and Computing. 553--557."},{"key":"e_1_3_2_2_94_1","volume-title":"Plugged in: How media attract and affect youth","author":"Valkenburg Patti M","unstructured":"Patti M Valkenburg and Jessica Taylor Piotrowski. 2017. Plugged in: How media attract and affect youth. Yale University Press."},{"key":"e_1_3_2_2_95_1","first-page":"1","article-title":"On the Use of EEG or MEG Brain Imaging Tools in Neuromarketing Research","volume":"3","author":"Vecchiato Giovanni","year":"2011","unstructured":"Giovanni Vecchiato, Laura Astolfi, Fabrizio De Vico Fallani, Jlenia Toppi, Fabio Aloise, Francesco Bez, Daming Wei, Wanzeng Kong, Jounging Dai, Febo Cincotti, Donatella Mattia, and Fabio Babiloni. 2011. On the Use of EEG or MEG Brain Imaging Tools in Neuromarketing Research. Journal Computational Intelligence and Neuroscience, Article 3 (2011), 3:1--3:12 pages.","journal-title":"Journal Computational Intelligence and Neuroscience, Article"},{"key":"e_1_3_2_2_96_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.2008.00114.x"},{"key":"e_1_3_2_2_97_1","volume-title":"Foundations of Digital Games","author":"Zagal Jos\u00e9 P","year":"2013","unstructured":"Jos\u00e9 P Zagal, Staffan Bj\u00f6rk, and Chris Lewis. 2013. Dark patterns in the design of games. In Foundations of Digital Games 2013."},{"key":"e_1_3_2_2_98_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327590ijhc1803_3"}],"event":{"name":"CHI '20: CHI Conference on Human Factors in Computing Systems","location":"Honolulu HI USA","acronym":"CHI '20","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3313831.3376600","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3313831.3376600","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:27Z","timestamp":1750199907000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3313831.3376600"}},"subtitle":["A Study on Mobile Applications and User Perception"],"short-title":[],"issued":{"date-parts":[[2020,4,21]]},"references-count":92,"alternative-id":["10.1145\/3313831.3376600","10.1145\/3313831"],"URL":"https:\/\/doi.org\/10.1145\/3313831.3376600","relation":{},"subject":[],"published":{"date-parts":[[2020,4,21]]},"assertion":[{"value":"2020-04-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}