{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T21:15:10Z","timestamp":1776114910154,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":103,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,5,6]],"date-time":"2021-05-06T00:00:00Z","timestamp":1620259200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Inria","award":["DATA4US Exploratory Action project"],"award-info":[{"award-number":["DATA4US Exploratory Action project"]}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1909714"],"award-info":[{"award-number":["1909714"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"ANR JCJC","award":["ANR-18-CE39-0008"],"award-info":[{"award-number":["ANR-18-CE39-0008"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,5,6]]},"DOI":"10.1145\/3411764.3445779","type":"proceedings-article","created":{"date-parts":[[2021,5,8]],"date-time":"2021-05-08T02:27:22Z","timestamp":1620440842000},"page":"1-18","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":141,"title":["Dark Patterns and the Legal Requirements of Consent Banners: An Interaction Criticism Perspective"],"prefix":"10.1145","author":[{"given":"Colin M.","family":"Gray","sequence":"first","affiliation":[{"name":"Purdue University, United States"}]},{"given":"Cristiana","family":"Santos","sequence":"additional","affiliation":[{"name":"Utrecht University, Netherlands"}]},{"given":"Nataliia","family":"Bielova","sequence":"additional","affiliation":[{"name":"Inria Sophia Antipolis, France"}]},{"given":"Michael","family":"Toth","sequence":"additional","affiliation":[{"name":"Inria, France"}]},{"given":"Damian","family":"Clifford","sequence":"additional","affiliation":[{"name":"Australian National University, Australia"}]}],"member":"320","published-online":{"date-parts":[[2021,5,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2019. Judgment in Case C-673\/17 Bundesverband der Verbraucherzentralen und Verbraucherverb\u00e4nde \u2013 Verbraucherzentrale Bundesverband eV v Planet49 GmbH. http:\/\/curia.europa.eu\/juris\/documents.jsf?num=C-673\/17.  2019. Judgment in Case C-673\/17 Bundesverband der Verbraucherzentralen und Verbraucherverb\u00e4nde \u2013 Verbraucherzentrale Bundesverband eV v Planet49 GmbH. http:\/\/curia.europa.eu\/juris\/documents.jsf?num=C-673\/17."},{"key":"e_1_3_2_1_2_1","volume-title":"Technology Policy Committee","author":"ACM","year":"2020","unstructured":"ACM U.S. Technology Policy Committee . 2020 . Statement on Principles and Prerequisites for the Development, Evaluation and Use of Unbiased Facial Recognition Technologies. techreport. Association for Computing Machinery . https:\/\/www.acm.org\/binaries\/content\/assets\/public-policy\/ustpc-facial-recognition-tech-statement.pdf ACM U.S. Technology Policy Committee. 2020. Statement on Principles and Prerequisites for the Development, Evaluation and Use of Unbiased Facial Recognition Technologies. techreport. Association for Computing Machinery. https:\/\/www.acm.org\/binaries\/content\/assets\/public-policy\/ustpc-facial-recognition-tech-statement.pdf"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Alessandro Acquisti Idris Adjerid Rebecca Balebako Laura Brandimarte Lorrie\u00a0Faith Cranor Saranga Komanduri Pedro\u00a0Giovanni Leon Norman\u00a0M. Sadeh Florian Schaub Manya Sleeper Yang Wang and Shomir Wilson. 2017. Nudges for Privacy and Security: Understanding and Assisting Users\u2019 Choices Online. ACM Comput. Surv. 50(2017) 44:1\u201344:41.  Alessandro Acquisti Idris Adjerid Rebecca Balebako Laura Brandimarte Lorrie\u00a0Faith Cranor Saranga Komanduri Pedro\u00a0Giovanni Leon Norman\u00a0M. Sadeh Florian Schaub Manya Sleeper Yang Wang and Shomir Wilson. 2017. Nudges for Privacy and Security: Understanding and Assisting Users\u2019 Choices Online. ACM Comput. Surv. 50(2017) 44:1\u201344:41.","DOI":"10.1145\/3054926"},{"key":"e_1_3_2_1_4_1","first-page":"1","article-title":"Sleights of privacy: framing, disclosures, and the limits of transparency","volume":"9","author":"Adjerid Idris","year":"2013","unstructured":"Idris Adjerid , Alessandro Acquisti , Laura Brandimarte , and George Loewenstein . 2013 . Sleights of privacy: framing, disclosures, and the limits of transparency . In SOUPS. ACM , 9 : 1 \u2013 9 :11. Idris Adjerid, Alessandro Acquisti, Laura Brandimarte, and George Loewenstein. 2013. Sleights of privacy: framing, disclosures, and the limits of transparency. In SOUPS. ACM, 9:1\u20139:11.","journal-title":"SOUPS. ACM"},{"key":"e_1_3_2_1_5_1","first-page":"246","article-title":"2019. Opinion of Advocate General Szpunar in Case C-673\/17","volume":"2019","year":"2019","unstructured":"Adv-gen-Szpunar- 2019 2019. Opinion of Advocate General Szpunar in Case C-673\/17 , ECLI:EU:C : 2019 : 246 \u2013 Planet49 GmbH v Bundes verbandder Verbraucherzentralen und Verbraucherverb\u00e4nde\u2013Verbraucherzentrale Bundesverbande. https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=CELEX:62017CC0673. Adv-gen-Szpunar-2019 2019. Opinion of Advocate General Szpunar in Case C-673\/17, ECLI:EU:C:2019:246 \u2013 Planet49 GmbH v Bundes verbandder Verbraucherzentralen und Verbraucherverb\u00e4nde\u2013Verbraucherzentrale Bundesverbande. https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=CELEX:62017CC0673.","journal-title":"ECLI:EU:C"},{"key":"e_1_3_2_1_6_1","unstructured":"Agencia Espa\u00f1ola de Protecci\u00f3n de Datos(AEPD). 2019. Guide on the use of cookies. www.aepd.es\/media\/guias\/guia-cookies.pdf.  Agencia Espa\u00f1ola de Protecci\u00f3n de Datos(AEPD). 2019. Guide on the use of cookies. www.aepd.es\/media\/guias\/guia-cookies.pdf."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/151220.151231"},{"key":"e_1_3_2_1_8_1","volume-title":"Guidelines on consent under Regulation 2016\/679","author":"Working Party Article","year":"2018","unstructured":"Article 29 Working Party . 2018. Guidelines on consent under Regulation 2016\/679 \u201d (WP259 rev.01), adopted on 10 April 2018 . https:\/\/ec.europa.eu\/newsroom\/article29\/item-detail.cfm?item_id=623051. Article 29 Working Party. 2018. Guidelines on consent under Regulation 2016\/679\u201d (WP259 rev.01), adopted on 10 April 2018. https:\/\/ec.europa.eu\/newsroom\/article29\/item-detail.cfm?item_id=623051."},{"key":"e_1_3_2_1_9_1","unstructured":"Autoriteit Persoonsgegevens. 2019. Cookies. https:\/\/autoriteitpersoonsgegevens.nl\/nl\/onderwerpen\/internet-telefoon-tv-en-post\/cookies#mag-ik-als-organisatie-een-cookiewall-gebruiken-7111.  Autoriteit Persoonsgegevens. 2019. Cookies. https:\/\/autoriteitpersoonsgegevens.nl\/nl\/onderwerpen\/internet-telefoon-tv-en-post\/cookies#mag-ik-als-organisatie-een-cookiewall-gebruiken-7111."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292015"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.intcom.2011.07.001"},{"key":"e_1_3_2_1_12_1","unstructured":"Belgian DPA. 2019. Cookies. www.autoriteprotectiondonnees.be\/faq-themas\/cookies.  Belgian DPA. 2019. Cookies. www.autoriteprotectiondonnees.be\/faq-themas\/cookies."},{"key":"e_1_3_2_1_13_1","volume-title":"Designing interactive systems : a comprehensive guide to HCI and interaction design. Pearson Education Limited","author":"Benyon David","unstructured":"David Benyon . 2014. Designing interactive systems : a comprehensive guide to HCI and interaction design. Pearson Education Limited , Harlow, UK . David Benyon. 2014. Designing interactive systems : a comprehensive guide to HCI and interaction design. Pearson Education Limited, Harlow, UK."},{"key":"e_1_3_2_1_14_1","unstructured":"BEUC. 2019. Position Paper \u2018Proposal For A Regulation On Privacy And Electronic Communications (E-Privacy)\u2019. www.beuc.eu\/publications\/beuc-x-2017-059_proposal_for_a_regulation_on_privacy_and_electronic_communications_e-privacy.pdf.  BEUC. 2019. Position Paper \u2018Proposal For A Regulation On Privacy And Electronic Communications (E-Privacy)\u2019. www.beuc.eu\/publications\/beuc-x-2017-059_proposal_for_a_regulation_on_privacy_and_electronic_communications_e-privacy.pdf."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.21552\/edpl\/2017\/3\/9"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208560"},{"key":"e_1_3_2_1_17_1","volume-title":"Harder to Ignore? Revisiting Pop-Up Fatigue and Approaches to Prevent It","author":"Bravo-Lillo Cristian","unstructured":"Cristian Bravo-Lillo , Lorrie\u00a0Faith Cranor , Saranga Komanduri , Stuart\u00a0 E. Schechter , and Manya Sleeper . 2014. Harder to Ignore? Revisiting Pop-Up Fatigue and Approaches to Prevent It . In SOUPS. USENIX Association , 105\u2013111. Cristian Bravo-Lillo, Lorrie\u00a0Faith Cranor, Saranga Komanduri, Stuart\u00a0E. Schechter, and Manya Sleeper. 2014. Harder to Ignore? Revisiting Pop-Up Fatigue and Approaches to Prevent It. In SOUPS. USENIX Association, 105\u2013111."},{"key":"e_1_3_2_1_18_1","unstructured":"Harry Brignull. 2013. Dark Patterns: inside the interfaces designed to trick you. http:\/\/www.theverge.com\/2013\/8\/29\/4640308\/dark-patterns-inside-the-interfaces-designed-to-trick-you. http:\/\/www.theverge.com\/2013\/8\/29\/4640308\/dark-patterns-inside-the-interfaces-designed-to-trick-you  Harry Brignull. 2013. Dark Patterns: inside the interfaces designed to trick you. http:\/\/www.theverge.com\/2013\/8\/29\/4640308\/dark-patterns-inside-the-interfaces-designed-to-trick-you. http:\/\/www.theverge.com\/2013\/8\/29\/4640308\/dark-patterns-inside-the-interfaces-designed-to-trick-you"},{"key":"e_1_3_2_1_19_1","unstructured":"Harry Brignull Marc Miquel Jeremy Rosenberg and James Offer. 2015. Dark Patterns - User Interfaces Designed to Trick People. http:\/\/darkpatterns.org\/. http:\/\/darkpatterns.org\/  Harry Brignull Marc Miquel Jeremy Rosenberg and James Offer. 2015. Dark Patterns - User Interfaces Designed to Trick People. http:\/\/darkpatterns.org\/. http:\/\/darkpatterns.org\/"},{"key":"e_1_3_2_1_20_1","unstructured":"Bundesbeauftragter f\u00fcr den Datenschutz und die Informationsfreiheit (BfDI German DPA). [n.d.]. Guidance from German authorities for telemedia providers (translation). https:\/\/deutschland.taylorwessing.com\/de\/documents\/get\/1820\/guidance-from-german-authorities-for-telemedia-providers-partial-translation.PDF_show_on_screen accessed on 2020.01.21.  Bundesbeauftragter f\u00fcr den Datenschutz und die Informationsfreiheit (BfDI German DPA). [n.d.]. Guidance from German authorities for telemedia providers (translation). https:\/\/deutschland.taylorwessing.com\/de\/documents\/get\/1820\/guidance-from-german-authorities-for-telemedia-providers-partial-translation.PDF_show_on_screen accessed on 2020.01.21."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Christoph B\u00f6sch Benjamin Erb Frank Kargl Henning Kopp and Stefan Pfattheicher. 2016. . https:\/\/dark.privacypatterns.eu\/.  Christoph B\u00f6sch Benjamin Erb Frank Kargl Henning Kopp and Stefan Pfattheicher. 2016. . https:\/\/dark.privacypatterns.eu\/.","DOI":"10.1515\/popets-2016-0038"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0038"},{"key":"e_1_3_2_1_23_1","unstructured":"CCPA-18 2018. California Consumer Privacy Act of 2018 [1798.100 - 1798.199] (CCPA). https:\/\/leginfo.legislature.ca.gov\/faces\/codes_displayText.xhtml?division=3.&part=4.&lawCode=CIV&title=1.81.5.  CCPA-18 2018. California Consumer Privacy Act of 2018 [1798.100 - 1798.199] (CCPA). https:\/\/leginfo.legislature.ca.gov\/faces\/codes_displayText.xhtml?division=3.&part=4.&lawCode=CIV&title=1.81.5."},{"key":"e_1_3_2_1_24_1","unstructured":"R\u00e9gis Chatellier Geoffrey Delcroix Estelle Hary and Camille Girard-Chanudet. 2019. Shaping Choices in the Digital World. https:\/\/linc.cnil.fr\/sites\/default\/files\/atoms\/files\/cnil_ip_report_06_shaping_choices_in_the_digital_world.pdf.  R\u00e9gis Chatellier Geoffrey Delcroix Estelle Hary and Camille Girard-Chanudet. 2019. Shaping Choices in the Digital World. https:\/\/linc.cnil.fr\/sites\/default\/files\/atoms\/files\/cnil_ip_report_06_shaping_choices_in_the_digital_world.pdf."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376459"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3312863"},{"key":"e_1_3_2_1_27_1","volume-title":"About face: the essentials of interaction design","author":"Cooper Alan","unstructured":"Alan Cooper , Robert Reimann , David Cronin , and Christopher Noessel . 2014. About face: the essentials of interaction design . John Wiley & Sons , Indianapolis, IN . Alan Cooper, Robert Reimann, David Cronin, and Christopher Noessel. 2014. About face: the essentials of interaction design. John Wiley & Sons, Indianapolis, IN."},{"key":"e_1_3_2_1_28_1","volume-title":"Integrating ethics in design through the value-sensitive design approach. Science and engineering ethics 12, 4","author":"Cummings L","year":"2006","unstructured":"Mary\u00a0 L Cummings . 2006. Integrating ethics in design through the value-sensitive design approach. Science and engineering ethics 12, 4 ( 2006 ), 701\u2013715. https:\/\/www.ncbi.nlm.nih.gov\/pubmed\/17199145 Mary\u00a0L Cummings. 2006. Integrating ethics in design through the value-sensitive design approach. Science and engineering ethics 12, 4 (2006), 701\u2013715. https:\/\/www.ncbi.nlm.nih.gov\/pubmed\/17199145"},{"key":"e_1_3_2_1_29_1","unstructured":"Datatilsynet. 2019. Guide on consent. www.datatilsynet.dk\/media\/6562\/samtykke.pdf.  Datatilsynet. 2019. Guide on consent. www.datatilsynet.dk\/media\/6562\/samtykke.pdf."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-6994-6_3-1"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2212776.2212708"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376600"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1057\/9781137437204_13"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557359"},{"key":"e_1_3_2_1_35_1","unstructured":"EDPS. 2017. EDPS Opinion 6\/2017 on the Proposal for a Regulation on Privacy and Electronic Communications (ePrivacy Regulation).  EDPS. 2017. EDPS Opinion 6\/2017 on the Proposal for a Regulation on Privacy and Electronic Communications (ePrivacy Regulation)."},{"key":"#cr-split#-e_1_3_2_1_36_1.1","unstructured":"ePD-09 2009. Directive 2009\/136\/EC of the European Parliament and of the Council of 25 November 2009 amending Directive 2002\/22\/EC on universal service and users' rights relating to electronic communications networks and services Directive 2002\/58\/EC concerning the processing of personal data and the protection of privacy in the electronic communications sector and Regulation"},{"key":"#cr-split#-e_1_3_2_1_36_1.2","unstructured":"(EC) No 2006\/2004 on cooperation between national authorities responsible for the enforcement of consumer protection laws (Text with EEA relevance). Directive 2009\/136\/EC. https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=celex%3A32009L0136. ePD-09 2009. Directive 2009\/136\/EC of the European Parliament and of the Council of 25 November 2009 amending Directive 2002\/22\/EC on universal service and users' rights relating to electronic communications networks and services Directive 2002\/58\/EC concerning the processing of personal data and the protection of privacy in the electronic communications sector and Regulation"},{"key":"#cr-split#-e_1_3_2_1_36_1.3","unstructured":"(EC) No 2006\/2004 on cooperation between national authorities responsible for the enforcement of consumer protection laws (Text with EEA relevance). Directive 2009\/136\/EC. https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=celex%3A32009L0136."},{"key":"e_1_3_2_1_37_1","unstructured":"Commission Nationale\u00a0Informatique et Libert\u00e9s\u00a0(CNIL). [n.d.]. On the practical procedures for collecting the consent provided for in article 82 of the french data protection act concerning operations of storing or gaining access to information in the terminal equipment of a user (recommendation \u201ccookies and other trackers\u201d). https:\/\/www.cnil.fr\/sites\/default\/files\/atoms\/files\/draft_recommendation_cookies_and_other_trackers_en.pdf.  Commission Nationale\u00a0Informatique et Libert\u00e9s\u00a0(CNIL). [n.d.]. On the practical procedures for collecting the consent provided for in article 82 of the french data protection act concerning operations of storing or gaining access to information in the terminal equipment of a user (recommendation \u201ccookies and other trackers\u201d). https:\/\/www.cnil.fr\/sites\/default\/files\/atoms\/files\/draft_recommendation_cookies_and_other_trackers_en.pdf."},{"key":"e_1_3_2_1_38_1","unstructured":"European Data Protection Board (EDPB). 2020. Guidelines 05\/2020 on consent under Regulation 2016\/679. https:\/\/edpb.europa.eu\/sites\/edpb\/files\/files\/file1\/edpb_guidelines_202005_consent_en.pdf  European Data Protection Board (EDPB). 2020. Guidelines 05\/2020 on consent under Regulation 2016\/679. https:\/\/edpb.europa.eu\/sites\/edpb\/files\/files\/file1\/edpb_guidelines_202005_consent_en.pdf"},{"key":"e_1_3_2_1_39_1","unstructured":"European Parliament. 2019. Report on the proposal for a regulation of the European Parliament and of the Council concerning the respect for private life and the protection of personal data in electronic communications and repealing Directive 2002\/58\/EC (Regulation on Privacy and Electronic Communications) (COM(2017)0010 \u2013 C8\u20110009\/2017 \u2013 2017\/0003(COD)). https:\/\/www.parlament.gv.at\/PAKT\/EU\/XXVII\/EU\/01\/51\/EU_15125\/imfname_10966469.pdf.  European Parliament. 2019. Report on the proposal for a regulation of the European Parliament and of the Council concerning the respect for private life and the protection of personal data in electronic communications and repealing Directive 2002\/58\/EC (Regulation on Privacy and Electronic Communications) (COM(2017)0010 \u2013 C8\u20110009\/2017 \u2013 2017\/0003(COD)). https:\/\/www.parlament.gv.at\/PAKT\/EU\/XXVII\/EU\/01\/51\/EU_15125\/imfname_10966469.pdf."},{"key":"e_1_3_2_1_40_1","unstructured":"Sheera Frenkel Mike Isaac Cecilia Kang and Gabriel J\u00a0X Dance. 2020. Facebook Employees Stage Virtual Walkout to Protest Trump Posts. https:\/\/www.nytimes.com\/2020\/06\/01\/technology\/facebook-employee-protest-trump.html  Sheera Frenkel Mike Isaac Cecilia Kang and Gabriel J\u00a0X Dance. 2020. Facebook Employees Stage Virtual Walkout to Protest Trump Posts. https:\/\/www.nytimes.com\/2020\/06\/01\/technology\/facebook-employee-protest-trump.html"},{"key":"e_1_3_2_1_41_1","volume-title":"Value Sensitive Design: Shaping Technology with Moral Imagination","author":"Friedman Batya","unstructured":"Batya Friedman and David\u00a0 G Hendry . 2019. Value Sensitive Design: Shaping Technology with Moral Imagination . MIT Press . https:\/\/market.android.com\/details?id=book-C4FruwEACAAJ Batya Friedman and David\u00a0G Hendry. 2019. Value Sensitive Design: Shaping Technology with Moral Imagination. MIT Press. https:\/\/market.android.com\/details?id=book-C4FruwEACAAJ"},{"key":"e_1_3_2_1_43_1","unstructured":"Frobrukerr\u00e5det (Norwegian Consumer Council). 2018. Deceived by design: How tech companies use dark patterns to discourage us from exercising our rights to privacy. https:\/\/www.forbrukerradet.no\/undersokelse\/no-undersokelsekategori\/deceived-by-design  Frobrukerr\u00e5det (Norwegian Consumer Council). 2018. Deceived by design: How tech companies use dark patterns to discourage us from exercising our rights to privacy. https:\/\/www.forbrukerradet.no\/undersokelse\/no-undersokelsekategori\/deceived-by-design"},{"key":"e_1_3_2_1_44_1","unstructured":"GDPR-16 2016. Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data and repealing Directive 95\/46\/EC (General Data Protection Regulation). https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679\/oj.  GDPR-16 2016. Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data and repealing Directive 95\/46\/EC (General Data Protection Regulation). https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679\/oj."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/306286.306293"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173016"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.31234\/osf.io"},{"key":"e_1_3_2_1_48_1","volume-title":"End User Accounts of Dark Patterns as Felt Manipulation. (Oct","author":"Gray M","year":"2020","unstructured":"Colin\u00a0 M Gray , Jingle Chen , Shruthi\u00a0Sai Chivukula , and Liyang Qu. 2020. End User Accounts of Dark Patterns as Felt Manipulation. (Oct . 2020 ). arxiv:2010.11046\u00a0[cs.HC] Colin\u00a0M Gray, Jingle Chen, Shruthi\u00a0Sai Chivukula, and Liyang Qu. 2020. End User Accounts of Dark Patterns as Felt Manipulation. (Oct. 2020). arxiv:2010.11046\u00a0[cs.HC]"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300408"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357236.3395486"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174108"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2598510.2598541"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1177\/1745691617702496"},{"key":"e_1_3_2_1_54_1","volume-title":"Privacy Design Strategies. Privacy Law Scholars Conference (PLSC) abs\/1210","author":"Hoepman Jaap-Henk","year":"2013","unstructured":"Jaap-Henk Hoepman . 2013 . Privacy Design Strategies. Privacy Law Scholars Conference (PLSC) abs\/1210 .6621 (2013). Jaap-Henk Hoepman. 2013. Privacy Design Strategies. Privacy Law Scholars Conference (PLSC) abs\/1210.6621 (2013)."},{"key":"e_1_3_2_1_55_1","unstructured":"House of Representatives of the Netherlands. 2019. Answer to questions from members Middendorp and Van Gent about a possible cookie wall ban. www.tweedekamer.nl\/kamerstukken\/kamervragen\/detail?id=2019D49667&did=2019D49667.  House of Representatives of the Netherlands. 2019. Answer to questions from members Middendorp and Van Gent about a possible cookie wall ban. www.tweedekamer.nl\/kamerstukken\/kamervragen\/detail?id=2019D49667&did=2019D49667."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-5784-2_12"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-018-9467-3"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372296"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357236.3395539"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1093\/ijlit\/eat011"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518875"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23386arxiv:1806.01156"},{"key":"e_1_3_2_1_64_1","unstructured":"Ronald\u00a0E. Leenes. 2015. The Cookiewars : From regulatory failure to user empowerment?. In The Privacy & Identity Lab. The Privacy & Identity Lab 31\u201349.  Ronald\u00a0E. Leenes. 2015. The Cookiewars : From regulatory failure to user empowerment?. In The Privacy & Identity Lab. The Privacy & Identity Lab 31\u201349."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2015.01.004"},{"key":"e_1_3_2_1_66_1","volume-title":"Luguri and Lior\u00a0Jacob Strahilevitz","author":"B.","year":"2019","unstructured":"Jamie\u00a0 B. Luguri and Lior\u00a0Jacob Strahilevitz . 2019 . Shining a Light on Dark Patterns. https:\/\/ssrn.com\/abstract=3431205 Public Law Working Paper No . 719. Jamie\u00a0B. Luguri and Lior\u00a0Jacob Strahilevitz. 2019. Shining a Light on Dark Patterns. https:\/\/ssrn.com\/abstract=3431205 Public Law Working Paper No. 719."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0037"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.17011\/ht"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11948-010-9198-2"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359183"},{"key":"e_1_3_2_1_71_1","volume-title":"Transparency and Consent Framework. In IEEE Symposium on Security and Privacy (IEEE S&P","author":"Matte C\u00e9lestin","year":"2020","unstructured":"C\u00e9lestin Matte , Cristiana Santos , and Nataliia Bielova . 2020 . Do Cookie Banners Respect my Choice? Measuring Legal Compliance of Banners from IAB Europe\u2019s Transparency and Consent Framework. In IEEE Symposium on Security and Privacy (IEEE S&P 2020). Accepted for publication.IEEE, 791\u2013809. C\u00e9lestin Matte, Cristiana Santos, and Nataliia Bielova. 2020. Do Cookie Banners Respect my Choice? Measuring Legal Compliance of Banners from IAB Europe\u2019s Transparency and Consent Framework. In IEEE Symposium on Security and Privacy (IEEE S&P 2020). Accepted for publication.IEEE, 791\u2013809."},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3264833"},{"key":"e_1_3_2_1_73_1","volume-title":"PATTERNS 2017: Proceedings of the 9th International Conference on Pervasive Patterns and Applications. 65\u201371","author":"Mirnig Alexander","year":"2017","unstructured":"Alexander Mirnig and Manfred Tscheligi . 2017 . (Don\u2019t) Join the Dark Side: An Initial Analysis and Classification of Regular, Anti-, and Dark Patterns . In PATTERNS 2017: Proceedings of the 9th International Conference on Pervasive Patterns and Applications. 65\u201371 . https:\/\/uni-salzburg.elsevierpure.com\/en\/publications\/dont-join-the-dark-side-an-initial-analysis-and-classification-of Alexander Mirnig and Manfred Tscheligi. 2017. (Don\u2019t) Join the Dark Side: An Initial Analysis and Classification of Regular, Anti-, and Dark Patterns. In PATTERNS 2017: Proceedings of the 9th International Conference on Pervasive Patterns and Applications. 65\u201371. https:\/\/uni-salzburg.elsevierpure.com\/en\/publications\/dont-join-the-dark-side-an-initial-analysis-and-classification-of"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/3400899.3400901"},{"key":"e_1_3_2_1_75_1","volume-title":"Evil by Design: Interaction Design to Lead Us into Temptation","author":"Nodder Chris","unstructured":"Chris Nodder . 2013. Evil by Design: Interaction Design to Lead Us into Temptation . John Wiley & Sons, Inc. 303 pages. https:\/\/market.android.com\/details?id=book-46Wl1G9yJUo C Chris Nodder. 2013. Evil by Design: Interaction Design to Lead Us into Temptation. John Wiley & Sons, Inc. 303 pages. https:\/\/market.android.com\/details?id=book-46Wl1G9yJUoC"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376321"},{"key":"e_1_3_2_1_77_1","unstructured":"Information\u00a0Commissioner\u2019s Office. 2019. Guidance on the use of cookies and similar technologies. https:\/\/ico.org.uk\/media\/for-organisations\/guide-to-pecr\/guidance-on-the-use-of-cookies-and-similar-technologies-1-0.pdf.  Information\u00a0Commissioner\u2019s Office. 2019. Guidance on the use of cookies and similar technologies. https:\/\/ico.org.uk\/media\/for-organisations\/guide-to-pecr\/guidance-on-the-use-of-cookies-and-similar-technologies-1-0.pdf."},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/2776885"},{"key":"e_1_3_2_1_79_1","unstructured":"Stigler\u00a0Committee on Digital\u00a0Platforms. 2019. Privacy and Data Protection Subcommittee Report. https:\/\/research.chicagobooth.edu\/-\/media\/research\/stigler\/pdfs\/data---report.pdf?la=en&hash=54ABA86A7A50C926458B5D44FBAAB83D673DB412.  Stigler\u00a0Committee on Digital\u00a0Platforms. 2019. Privacy and Data Protection Subcommittee Report. https:\/\/research.chicagobooth.edu\/-\/media\/research\/stigler\/pdfs\/data---report.pdf?la=en&hash=54ABA86A7A50C926458B5D44FBAAB83D673DB412."},{"key":"e_1_3_2_1_80_1","unstructured":"Opinion of Advocate General Szpunar. 2020. Opinion of the Case C\u201161\/19 Orange Rom\u00e2nia SA v Autoritatea Na\u0163ional\u0103 de Supraveghere a Prelucr\u0103rii Datelor cu Caracter Personal (ANSPDCP). ECLI:EU:C:2020:158 https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=CELEX:62019CC0061.  Opinion of Advocate General Szpunar. 2020. Opinion of the Case C\u201161\/19 Orange Rom\u00e2nia SA v Autoritatea Na\u0163ional\u0103 de Supraveghere a Prelucr\u0103rii Datelor cu Caracter Personal (ANSPDCP). ECLI:EU:C:2020:158 https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=CELEX:62019CC0061."},{"key":"e_1_3_2_1_81_1","volume-title":"Qualitative evaluation and research methods","author":"Patton Michael\u00a0Quinn","unstructured":"Michael\u00a0Quinn Patton . 2001. Qualitative evaluation and research methods ( 3 rd ed.). Sage Publications , Thousand Oaks . Michael\u00a0Quinn Patton. 2001. Qualitative evaluation and research methods (3rd ed.). Sage Publications, Thousand Oaks.","edition":"3"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.26116\/techreg.2020.009"},{"key":"e_1_3_2_1_83_1","volume-title":"Eleventh Symposium On Usable Privacy and Security (SOUPS 2015","author":"Schaub Florian","year":"2015","unstructured":"Florian Schaub , Rebecca Balebako , Adam\u00a0 L. Durity , and Lorrie\u00a0Faith Cranor . 2015 . A Design Space for Effective Privacy Notices . In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015 ). USENIX Association, Ottawa, 1\u201317. https:\/\/www.usenix.org\/conference\/soups 2015\/proceedings\/presentation\/schaub Florian Schaub, Rebecca Balebako, Adam\u00a0L. Durity, and Lorrie\u00a0Faith Cranor. 2015. A Design Space for Effective Privacy Notices. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015). USENIX Association, Ottawa, 1\u201317. https:\/\/www.usenix.org\/conference\/soups2015\/proceedings\/presentation\/schaub"},{"key":"e_1_3_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1177\/0162243912436985"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1177\/0162243917714869"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1561\/1100000073"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1093\/iwc"},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531625"},{"key":"e_1_3_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419249.3420132"},{"key":"e_1_3_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300314"},{"key":"e_1_3_2_1_91_1","unstructured":"Luke Stark. 2014. Come on Feel the Data (and Smell It). https:\/\/www.theatlantic.com\/technology\/archive\/2014\/05\/data-visceralization\/370899\/  Luke Stark. 2014. Come on Feel the Data (and Smell It). https:\/\/www.theatlantic.com\/technology\/archive\/2014\/05\/data-visceralization\/370899\/"},{"key":"e_1_3_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1177\/0162243914547645"},{"key":"e_1_3_2_1_93_1","unstructured":"Peter Suciu. 2020. Brands Aren\u2019t Social Distancing From Social Media They\u2019re Boycotting!https:\/\/www.forbes.com\/sites\/petersuciu\/2020\/07\/01\/brands-arent-social-distancing-from-social-media-theyre-boycotting\/  Peter Suciu. 2020. Brands Aren\u2019t Social Distancing From Social Media They\u2019re Boycotting!https:\/\/www.forbes.com\/sites\/petersuciu\/2020\/07\/01\/brands-arent-social-distancing-from-social-media-theyre-boycotting\/"},{"key":"e_1_3_2_1_94_1","volume-title":"Designing Interfaces: Patterns for Effective Interaction Design. O\u2019Reilly Media","author":"Tidwell Jenifer","year":"2010","unstructured":"Jenifer Tidwell . 2010 . Designing Interfaces: Patterns for Effective Interaction Design. O\u2019Reilly Media , Inc .https:\/\/market.android.com\/details?id=book-5gvOU9X0fu0C Jenifer Tidwell. 2010. Designing Interfaces: Patterns for Effective Interaction Design. O\u2019Reilly Media, Inc.https:\/\/market.android.com\/details?id=book-5gvOU9X0fu0C"},{"key":"e_1_3_2_1_95_1","unstructured":"Michael Toth Nataliia Bielova Cristiana Santos Vincent Roca and C\u00e9lestin Matte. 2020. Contribution to the public consultation on the CNIL\u2019s draft recommendation on \u201dcookies and other trackers\u201d. https:\/\/hal.inria.fr\/hal-02490531  Michael Toth Nataliia Bielova Cristiana Santos Vincent Roca and C\u00e9lestin Matte. 2020. Contribution to the public consultation on the CNIL\u2019s draft recommendation on \u201dcookies and other trackers\u201d. https:\/\/hal.inria.fr\/hal-02490531"},{"key":"e_1_3_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354212"},{"key":"e_1_3_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11948-011-9343-6"},{"key":"e_1_3_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.copsyc.2019.08.025"},{"key":"e_1_3_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357236.3395505"},{"key":"e_1_3_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1177\/0007650317718185"},{"key":"e_1_3_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1145\/3012934"},{"key":"e_1_3_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1145\/3389685"},{"key":"e_1_3_2_1_103_1","unstructured":"\u00d6sterreichische Datenschutzbeh\u00f6rde. 2018. Decision on the validity of consent. www.ris.bka.gv.at\/Dokumente\/Dsk\/DSBT_20181130_DSB_D122_931_0003_DSB_2018_00\/DSBT_20181130_DSB_D122_931_0003_DSB_2018_00.pdf.  \u00d6sterreichische Datenschutzbeh\u00f6rde. 2018. Decision on the validity of consent. www.ris.bka.gv.at\/Dokumente\/Dsk\/DSBT_20181130_DSB_D122_931_0003_DSB_2018_00\/DSBT_20181130_DSB_D122_931_0003_DSB_2018_00.pdf."}],"event":{"name":"CHI '21: CHI Conference on Human Factors in Computing Systems","location":"Yokohama Japan","acronym":"CHI '21","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411764.3445779","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3411764.3445779","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3411764.3445779","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:48Z","timestamp":1750195488000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3411764.3445779"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,6]]},"references-count":103,"alternative-id":["10.1145\/3411764.3445779","10.1145\/3411764"],"URL":"https:\/\/doi.org\/10.1145\/3411764.3445779","relation":{},"subject":[],"published":{"date-parts":[[2021,5,6]]},"assertion":[{"value":"2021-05-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}