{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T02:37:01Z","timestamp":1775702221947,"version":"3.50.1"},"reference-count":33,"publisher":"Association for Computing Machinery (ACM)","issue":"9","license":[{"start":{"date-parts":[[2020,8,21]],"date-time":"2020-08-21T00:00:00Z","timestamp":1597968000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2020,8,21]]},"abstract":"<jats:p>The evolution of tricky user interfaces.<\/jats:p>","DOI":"10.1145\/3397884","type":"journal-article","created":{"date-parts":[[2020,8,21]],"date-time":"2020-08-21T22:20:51Z","timestamp":1598048451000},"page":"42-47","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":28,"title":["Dark patterns"],"prefix":"10.1145","volume":"63","author":[{"given":"Arvind","family":"Narayanan","sequence":"first","affiliation":[{"name":"Princeton University, Princeton, NJ"}]},{"given":"Arunesh","family":"Mathur","sequence":"additional","affiliation":[{"name":"Princeton University, Princeton, NJ"}]},{"given":"Marshini","family":"Chetty","sequence":"additional","affiliation":[{"name":"University of Chicago, IL"}]},{"given":"Mihir","family":"Kshirsagar","sequence":"additional","affiliation":[{"name":"Princeton University's Center for Information Technology Policy, Princeton, NJ"}]}],"member":"320","published-online":{"date-parts":[[2020,8,21]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3054926"},{"key":"e_1_2_1_2_1","unstructured":"Ariely D. Predictably Irrational. Harper Audio New York NY 2008.  Ariely D. Predictably Irrational. Harper Audio New York NY 2008."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1002\/mar.20084"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0038"},{"key":"e_1_2_1_5_1","first-page":"4","article-title":"Digital market manipulation","volume":"82","author":"Calo R","year":"2014","unstructured":"Calo , R . Digital market manipulation . George Washington Law Review 82 , 4 ( 2014 ), 995--1051; http:\/\/www.gwlr.org\/wp-content\/uploads\/2014\/10\/Calo_82_41.pdf. Calo, R. Digital market manipulation. George Washington Law Review 82, 4 (2014), 995--1051; http:\/\/www.gwlr.org\/wp-content\/uploads\/2014\/10\/Calo_82_41.pdf.","journal-title":"George Washington Law Review"},{"key":"e_1_2_1_6_1","volume-title":"The CNIL's restricted committee imposes a financial penalty of 50 million euros against Google LLC","author":"Commission Nationale de l'Informatique et des Libert\u00e9s.","year":"2019","unstructured":"Commission Nationale de l'Informatique et des Libert\u00e9s. The CNIL's restricted committee imposes a financial penalty of 50 million euros against Google LLC , 2019 ; https:\/\/bit.ly\/3dtTcoS. Commission Nationale de l'Informatique et des Libert\u00e9s. The CNIL's restricted committee imposes a financial penalty of 50 million euros against Google LLC, 2019; https:\/\/bit.ly\/3dtTcoS."},{"key":"e_1_2_1_7_1","volume-title":"United States Senator for Nebraska. Senators introduce bipartisan legislation to ban manipulative dark patterns","author":"Fischer D.","year":"2019","unstructured":"Fischer , D. United States Senator for Nebraska. Senators introduce bipartisan legislation to ban manipulative dark patterns , 2019 ; https:\/\/bit.ly\/3eQO4LT. Fischer, D. United States Senator for Nebraska. Senators introduce bipartisan legislation to ban manipulative dark patterns, 2019; https:\/\/bit.ly\/3eQO4LT."},{"key":"e_1_2_1_8_1","volume-title":"Proceedings of the 2020 ACM Conference on Human Factors in Computing Systems.","author":"Di Geronimo L.","unstructured":"Di Geronimo , L. , Braz , L. , Fregnan , E. , Palomba F. and Bachelli , A . UI dark patterns and where to find them: a study on mobile applications and user perception . In Proceedings of the 2020 ACM Conference on Human Factors in Computing Systems. Di Geronimo, L., Braz, L., Fregnan, E., Palomba F. and Bachelli, A. UI dark patterns and where to find them: a study on mobile applications and user perception. In Proceedings of the 2020 ACM Conference on Human Factors in Computing Systems."},{"key":"e_1_2_1_9_1","volume-title":"ProPublica (April 22","author":"Elliott J.","year":"2019","unstructured":"Elliott , J. and Waldron , L . Here's how TurboTax just tricked you into paying to file your taxes . ProPublica (April 22 , 2019 ); https:\/\/www.propublica.org\/article\/turbotax-just-tricked-you-into-paying-to-file-your-taxes. Elliott, J. and Waldron, L. Here's how TurboTax just tricked you into paying to file your taxes. ProPublica (April 22, 2019); https:\/\/www.propublica.org\/article\/turbotax-just-tricked-you-into-paying-to-file-your-taxes."},{"key":"e_1_2_1_10_1","unstructured":"European Data Protection Board. Guidelines 4\/2019 on Article 25 Data Protection by Design and by Default; https:\/\/bit.ly\/3710o9s.  European Data Protection Board. Guidelines 4\/2019 on Article 25 Data Protection by Design and by Default; https:\/\/bit.ly\/3710o9s."},{"key":"e_1_2_1_11_1","volume-title":"A brief overview of the Federal Trade Commission's investigative, law enforcement, and rulemaking authority","author":"Federal Trade Commission","year":"2019","unstructured":"Federal Trade Commission . A brief overview of the Federal Trade Commission's investigative, law enforcement, and rulemaking authority , 2019 ; https:\/\/www.ftc.gov\/about-ftc\/what-we-do\/enforcement-authority. Federal Trade Commission. A brief overview of the Federal Trade Commission's investigative, law enforcement, and rulemaking authority, 2019; https:\/\/www.ftc.gov\/about-ftc\/what-we-do\/enforcement-authority."},{"key":"e_1_2_1_12_1","volume-title":"FTC finalizes settlement with company that misled consumers about how it accesses and uses their email","author":"Federal Trade Commission","year":"2019","unstructured":"Federal Trade Commission . FTC finalizes settlement with company that misled consumers about how it accesses and uses their email , 2019 ; https:\/\/bit.ly\/3h0l7PF. Federal Trade Commission. FTC finalizes settlement with company that misled consumers about how it accesses and uses their email, 2019; https:\/\/bit.ly\/3h0l7PF."},{"key":"e_1_2_1_13_1","volume-title":"FTC sues owner of online dating service Match.com for using fake love interest ads to trick consumers into paying for a Match. com subscription","author":"Federal Trade Commission","year":"2019","unstructured":"Federal Trade Commission . FTC sues owner of online dating service Match.com for using fake love interest ads to trick consumers into paying for a Match. com subscription . Sept. 25, 2019 ; https:\/\/bit.ly\/3dArhUb. Federal Trade Commission. FTC sues owner of online dating service Match.com for using fake love interest ads to trick consumers into paying for a Match. com subscription. Sept. 25, 2019; https:\/\/bit.ly\/3dArhUb."},{"key":"e_1_2_1_14_1","unstructured":"Federal Trade Commission. Ganley Ford 2013; https:\/\/bit.ly\/2XxHwft.  Federal Trade Commission. Ganley Ford 2013; https:\/\/bit.ly\/2XxHwft."},{"key":"e_1_2_1_15_1","first-page":"7844","volume-title":"Eds. Springer","author":"Friedman B.","year":"2013","unstructured":"Friedman , B. , Kahn , P. H. , Borning , A. and Huldtgren , A . Value-sensitive design and information systems. Early Engagement and New Technologies: Opening Up the Laboratory. N. Doorn, D. Schuurbiers, I. van de Poel, M.E. Gorman , Eds. Springer , Dordrecht, Germany , 2013 , 55--95; https:\/\/link.springer.com\/book\/10.1007\/978-94-007- 7844 - 7843 . Friedman, B., Kahn, P. H., Borning, A. and Huldtgren, A. Value-sensitive design and information systems. Early Engagement and New Technologies: Opening Up the Laboratory. N. Doorn, D. Schuurbiers, I. van de Poel, M.E. Gorman, Eds. Springer, Dordrecht, Germany, 2013, 55--95; https:\/\/link.springer.com\/book\/10.1007\/978-94-007-7844-3."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1086\/586910"},{"key":"e_1_2_1_17_1","first-page":"1338","article-title":"Do defaults save lives?","volume":"302","author":"Goldstein D.","unstructured":"Goldstein , D. and Johnson , E.J . Do defaults save lives? Science 302 , 5649 (2003), 1338 -- 1339 ; https:\/\/science.sciencemag.org\/content\/302\/5649\/1338. Goldstein, D. and Johnson, E.J. Do defaults save lives? Science 302, 5649 (2003), 1338--1339; https:\/\/science.sciencemag.org\/content\/302\/5649\/1338.","journal-title":"Science"},{"key":"e_1_2_1_18_1","volume-title":"Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (April), 1--14; https:\/\/dl.acm.org\/doi\/10","author":"Gray C.M.","unstructured":"Gray , C.M. , Kou , Y. , Battles , B. , Hoggatt , J. , Toombs , A.L. The dark (patterns) side of UX design. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (April), 1--14; https:\/\/dl.acm.org\/doi\/10 .1145\/3173574.3174108. Gray, C.M., Kou, Y., Battles, B., Hoggatt, J., Toombs, A.L. The dark (patterns) side of UX design. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (April), 1--14; https:\/\/dl.acm.org\/doi\/10.1145\/3173574.3174108."},{"key":"e_1_2_1_19_1","volume-title":"Shining a light on dark patterns","author":"Luguri J.","unstructured":"Luguri , J. and Strahilevitz , L . Shining a light on dark patterns . University of Chicago , Public Law Working Paper. No. 719, 2019. Luguri, J. and Strahilevitz, L. Shining a light on dark patterns. University of Chicago, Public Law Working Paper. No. 719, 2019."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290359"},{"key":"e_1_2_1_21_1","volume-title":"9 iconic growth hacks tech companies used to boost their user bases. The Next Web","author":"McLaughlin J.","year":"2014","unstructured":"McLaughlin , J. 9 iconic growth hacks tech companies used to boost their user bases. The Next Web , 2014 ; https:\/\/bit.ly\/2MtX0L1. McLaughlin, J. 9 iconic growth hacks tech companies used to boost their user bases. The Next Web, 2014; https:\/\/bit.ly\/2MtX0L1."},{"key":"e_1_2_1_22_1","volume-title":"How Reddit got huge: tons of fake accounts. Vice","author":"Mead D.","year":"2012","unstructured":"Mead , D. How Reddit got huge: tons of fake accounts. Vice , 2012 ; https:\/\/www.vice.com\/en_us\/article\/z4444w\/how-reddit-got-huge-tons-of-fake-accounts--2. Mead, D. How Reddit got huge: tons of fake accounts. Vice, 2012; https:\/\/www.vice.com\/en_us\/article\/z4444w\/how-reddit-got-huge-tons-of-fake-accounts--2."},{"key":"e_1_2_1_23_1","volume-title":"Airbnb farmed Craigslist to grow its listings, says competitor. Business Insider","author":"Rosoff M.","year":"2011","unstructured":"Rosoff , M. Airbnb farmed Craigslist to grow its listings, says competitor. Business Insider , 2011 ; https:\/\/bit.ly\/2Mv23L7 Rosoff, M. Airbnb farmed Craigslist to grow its listings, says competitor. Business Insider, 2011; https:\/\/bit.ly\/2Mv23L7"},{"key":"e_1_2_1_24_1","volume-title":"New York Times (Apr. 22","author":"Scheiber N.","year":"2017","unstructured":"Scheiber , N. How Uber uses psychological tricks to push its drivers' buttons . New York Times (Apr. 22 , 2017 ); https:\/\/nyti.ms\/3h3RuNk Scheiber, N. How Uber uses psychological tricks to push its drivers' buttons. New York Times (Apr. 22, 2017); https:\/\/nyti.ms\/3h3RuNk"},{"key":"e_1_2_1_25_1","volume-title":"LinkedIn pays big after class action lawsuit over user emails. Mashable","author":"Strange A.","year":"2015","unstructured":"Strange , A. LinkedIn pays big after class action lawsuit over user emails. Mashable , 2015 ; https:\/\/mashable.com\/2015\/10\/03\/linkedin-class-action. Strange, A. LinkedIn pays big after class action lawsuit over user emails. Mashable, 2015; https:\/\/mashable.com\/2015\/10\/03\/linkedin-class-action."},{"issue":"1","key":"e_1_2_1_26_1","first-page":"1","article-title":"Online manipulation: hidden influences in a digital world","volume":"4","author":"Susser D.","year":"2019","unstructured":"Susser , D. , Roessler , B. and Nissenbaum , H . Online manipulation: hidden influences in a digital world . Georgetown Law Technology Review 4 . 1 ( 2019 ), 1 -- 45 ; https:\/\/philarchive.org\/archive\/SUSOMHv1. Susser, D., Roessler, B. and Nissenbaum, H. Online manipulation: hidden influences in a digital world. Georgetown Law Technology Review 4.1 (2019), 1--45; https:\/\/philarchive.org\/archive\/SUSOMHv1.","journal-title":"Georgetown Law Technology Review"},{"key":"e_1_2_1_27_1","volume-title":"not sludge. Science 361","author":"Thaler R.H.","year":"2018","unstructured":"Thaler , R.H. Nudge , not sludge. Science 361 ( 2018 ), 431--431. Thaler, R.H. Nudge, not sludge. Science 361 (2018), 431--431."},{"key":"e_1_2_1_28_1","volume-title":"Nudge: Improving Decisions About Health, Wealth, and Happiness","author":"Thaler R.H.","year":"2009","unstructured":"Thaler , R.H. , Sunstein , C.R. Nudge: Improving Decisions About Health, Wealth, and Happiness . Penguin Books , 2009 . Thaler, R.H., Sunstein, C.R. Nudge: Improving Decisions About Health, Wealth, and Happiness. Penguin Books, 2009."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.185.4157.1124"},{"key":"e_1_2_1_30_1","volume-title":"Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019","author":"Utz C.","year":"1953","unstructured":"Utz , C. , Degeling , M. , Fahl , S. , Schaub , F. , Holz , T. ( Un ) informed consent : Studying GDPR consent notices in the field . In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019 , 973--990; https:\/\/dl.acm.org\/doi\/10.1145\/33 1953 5.3354212. Utz, C., Degeling, M., Fahl, S., Schaub, F., Holz, T. (Un) informed consent: Studying GDPR consent notices in the field. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019, 973--990; https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3354212."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0013"},{"key":"e_1_2_1_32_1","volume-title":"New York Times (Jan. 31","author":"Wakabayashi D.","year":"2020","unstructured":"Wakabayashi , D. and Hsu , T . Why Google backtracked on its new search results look . New York Times (Jan. 31 , 2020 ); https:\/\/nyti.ms\/2XYvg6I. Wakabayashi, D. and Hsu, T. Why Google backtracked on its new search results look. New York Times (Jan. 31, 2020); https:\/\/nyti.ms\/2XYvg6I."},{"key":"e_1_2_1_33_1","volume-title":"Cognitive biases, dark patterns, and the 'privacy paradox.' SSRN","author":"Waldman A.E.","year":"2019","unstructured":"Waldman , A.E. Cognitive biases, dark patterns, and the 'privacy paradox.' SSRN , 2019 . Waldman, A.E. Cognitive biases, dark patterns, and the 'privacy paradox.' SSRN, 2019."}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3397884","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3397884","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:53Z","timestamp":1750199933000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3397884"}},"subtitle":["past, present, and future"],"short-title":[],"issued":{"date-parts":[[2020,8,21]]},"references-count":33,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2020,8,21]]}},"alternative-id":["10.1145\/3397884"],"URL":"https:\/\/doi.org\/10.1145\/3397884","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"value":"0001-0782","type":"print"},{"value":"1557-7317","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,8,21]]},"assertion":[{"value":"2020-08-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}