{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,14]],"date-time":"2026-05-14T17:23:04Z","timestamp":1778779384750,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":99,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,4,19]],"date-time":"2023-04-19T00:00:00Z","timestamp":1681862400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["#1955227"],"award-info":[{"award-number":["#1955227"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006785","name":"Google","doi-asserted-by":"publisher","award":["ASPIRE grant"],"award-info":[{"award-number":["ASPIRE grant"]}],"id":[{"id":"10.13039\/100006785","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Consumer Reports"},{"name":"Sloan Fellowship"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,4,19]]},"DOI":"10.1145\/3544548.3581432","type":"proceedings-article","created":{"date-parts":[[2023,4,20]],"date-time":"2023-04-20T04:28:44Z","timestamp":1681964924000},"page":"1-27","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":32,"title":["Understanding Dark Patterns in Home IoT Devices"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8293-9630","authenticated-orcid":false,"given":"Monica","family":"Kowalczyk","sequence":"first","affiliation":[{"name":"Northeastern University, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5813-9019","authenticated-orcid":false,"given":"Johanna T.","family":"Gunawan","sequence":"additional","affiliation":[{"name":"Northeastern University, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7825-7226","authenticated-orcid":false,"given":"David","family":"Choffnes","sequence":"additional","affiliation":[{"name":"Northeastern University, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8115-898X","authenticated-orcid":false,"given":"Daniel J","family":"Dubois","sequence":"additional","affiliation":[{"name":"Khoury College of Computer Sciences, Northeastern University, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2475-5072","authenticated-orcid":false,"given":"Woodrow","family":"Hartzog","sequence":"additional","affiliation":[{"name":"School of Law, Boston University, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5268-004X","authenticated-orcid":false,"given":"Christo","family":"Wilson","sequence":"additional","affiliation":[{"name":"Khoury College of Computer Sciences, Northeastern University, United States"}]}],"member":"320","published-online":{"date-parts":[[2023,4,19]]},"reference":[{"key":"e_1_3_3_3_1_1","volume-title":"Deliberation of the restricted committee No. SAN-2021-023 of","year":"2021","unstructured":"2021. Deliberation of the restricted committee No. SAN-2021-023 of 31 December 2021 concerning GOOGLE LLC and GOOGLE IRELAND LIMITED. https:\/\/www.cnil.fr\/sites\/default\/files\/atoms\/files\/deliberation_of_the_restricted_committee_no._san-2021-023_of_31_december_2021_concerning_google_llc_and_google_ireland_limited.pdf."},{"key":"e_1_3_3_3_2_1","unstructured":"117th U.S.\u00a0Congress. 2022. H.R.8152 American Data Privacy and Protection Act. (July 2022). https:\/\/www.congress.gov\/bill\/117th-congress\/house-bill\/8152\/text"},{"key":"e_1_3_3_3_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491101.3519837"},{"key":"e_1_3_3_3_4_1","unstructured":"California Consumer\u00a0Privacy Act. 2020. California Consumer Privacy Act (Final Text of Proposed Regulations). https:\/\/www.oag.ca.gov\/sites\/all\/files\/agweb\/pdfs\/privacy\/oal-sub-final-text-of-regs.pdf"},{"key":"e_1_3_3_3_5_1","unstructured":"California Consumer\u00a0Privacy Act. 2021. CCPA Opt-Out Icon. https:\/\/oag.ca.gov\/privacy\/ccpa\/icons-download"},{"key":"e_1_3_3_3_6_1","unstructured":"California Privacy\u00a0Rights Act. 2020. California Privacy Rights Act. https:\/\/leginfo.legislature.ca.gov\/faces\/codes_displayText.xhtml?division=3.&part=4.&lawCode=CIV&title=1.81.5"},{"key":"e_1_3_3_3_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3415187"},{"key":"e_1_3_3_3_8_1","unstructured":"Haldun Akgolu. 2018. User\u2019s guide to correlation coefficients. Turkish Journal of Emergency Medicine(2018). https:\/\/www.ncbi.nlm.nih.gov\/pmc\/articles\/PMC6107969\/"},{"key":"e_1_3_3_3_9_1","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2017.717"},{"key":"e_1_3_3_3_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00013"},{"key":"e_1_3_3_3_11_1","volume-title":"Proc. of USENIX Security Symposium. 1093\u20131110","author":"Antonakakis Manos","year":"2017","unstructured":"Manos Antonakakis, Tim April, Michael Bailey, Matt Bernhard, Elie Bursztein, Jaime Cochran, Zakir Durumeric, J\u00a0Alex Halderman, Luca Invernizzi, Michalis Kallitsis, 2017. Understanding the Mirai Botnet. In Proc. of USENIX Security Symposium. 1093\u20131110."},{"key":"e_1_3_3_3_12_1","volume-title":"Data and Algorithmic Transparency Workshop(2016)","author":"Apthorpe Noah","year":"2016","unstructured":"Noah Apthorpe, Dillon Reisman, and Nick Feamster. 2016. A Smart Home is No Castle: Privacy Vulnerabilities of Encrypted IoT Traf\ufb01c. Data and Algorithmic Transparency Workshop(2016), 6."},{"key":"e_1_3_3_3_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.33"},{"key":"e_1_3_3_3_14_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0066"},{"key":"e_1_3_3_3_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3424771.3424777"},{"key":"e_1_3_3_3_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3472301.3484336"},{"key":"e_1_3_3_3_17_1","unstructured":"Dieter Bohn. 2017. Google\u2019s Home Mini needed a software patch to stop some of them from recording everything. https:\/\/www.theverge.com\/2017\/10\/10\/16456050\/google-home-mini-always-recording-bug"},{"key":"e_1_3_3_3_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3461778.3462086"},{"key":"e_1_3_3_3_19_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0038"},{"key":"e_1_3_3_3_20_1","unstructured":"Harry Brignull. 2010. Types of Deceptive Design. https:\/\/www.deceptive.design\/types."},{"key":"e_1_3_3_3_21_1","volume-title":"Light: An FTC Workshop","author":"Bringing Dark","year":"2021","unstructured":"[21] Bringing Dark Patterns to Light: An FTC Workshop 2021. https:\/\/www.ftc.gov\/news-events\/events-calendar\/bringing-dark-patterns-light-ftc-workshop"},{"key":"e_1_3_3_3_22_1","volume-title":"Sensitive Information Tracking in Commodity IoT. In 27th USENIX Security Symposium (USENIX Security 18)","author":"Celik Z\u00a0Berkay","year":"2018","unstructured":"Z\u00a0Berkay Celik, Leonardo Babun, Amit\u00a0Kumar Sikder, Hidayet Aksu, Gang Tan, Patrick McDaniel, and A\u00a0Selcuk Uluagac. 2018. Sensitive Information Tracking in Commodity IoT. In 27th USENIX Security Symposium (USENIX Security 18). 1687\u20131704."},{"key":"e_1_3_3_3_23_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0060"},{"key":"e_1_3_3_3_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772719"},{"key":"e_1_3_3_3_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376600"},{"key":"e_1_3_3_3_27_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0072"},{"key":"e_1_3_3_3_28_1","unstructured":"A. Dutta A. Gupta and A. Zissermann. 2016. VGG Image Annotator (VIA). http:\/\/www.robots.ox.ac.uk\/\u00a0vgg\/software\/via\/."},{"key":"e_1_3_3_3_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3343031.3350535"},{"key":"e_1_3_3_3_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00112"},{"key":"e_1_3_3_3_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300764"},{"key":"e_1_3_3_3_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.44"},{"key":"e_1_3_3_3_33_1","volume-title":"Dark Commercial Patterns. https:\/\/www.oecd-ilibrary.org\/docserver\/44f5e846-en.pdf?expires=1670358058&id=id&accname=guest&checksum=C06C85A96CF608E11AD88986E583DF54","author":"Organization for Economic Co-operationand Development. 2022.","unstructured":"Organization for Economic Co-operationand Development. 2022. Dark Commercial Patterns. https:\/\/www.oecd-ilibrary.org\/docserver\/44f5e846-en.pdf?expires=1670358058&id=id&accname=guest&checksum=C06C85A96CF608E11AD88986E583DF54"},{"key":"e_1_3_3_3_35_1","unstructured":"FTC. 2013. .com Disclosures. https:\/\/www.ftc.gov\/sites\/default\/files\/attachments\/press-releases\/ftc-staff-revises-online-advertising-disclosure-guidelines\/130312dotcomdisclosures.pdf"},{"key":"e_1_3_3_3_36_1","unstructured":"Google. 2022. Explore what you can do with Google Nest or Home devices. https:\/\/support.google.com\/googlenest\/answer\/7130274"},{"key":"e_1_3_3_3_37_1","unstructured":"Colin\u00a0M. Gray. 2019. The dark side of UX Design. https:\/\/darkpatterns.uxp2.com\/."},{"key":"e_1_3_3_3_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479516"},{"key":"e_1_3_3_3_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174108"},{"key":"e_1_3_3_3_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445779"},{"key":"e_1_3_3_3_41_1","doi-asserted-by":"publisher","DOI":"10.33621\/jdsr.v3i1.54"},{"key":"e_1_3_3_3_42_1","volume-title":"A Comparative Study of Dark Patterns Across Mobile and Web Modalities. (Oct","author":"Gunawan Johanna","year":"2021","unstructured":"Johanna Gunawan, David Choffnes, Woodrow Hartzog, and Christo Wilson. 2021. A Comparative Study of Dark Patterns Across Mobile and Web Modalities. (Oct. 2021)."},{"key":"e_1_3_3_3_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3511265.3550448"},{"key":"e_1_3_3_3_44_1","volume-title":"Dark patterns in cookie consent notices: new definitions and mitigation strategies. Position Papers of CHI\u201922 \"What Can CHI Do About Dark Patterns?","author":"Guribye Frode","year":"2021","unstructured":"Frode Guribye, Oda\u00a0Elise Nordberg, Are Nyhammer, Marija Slavkovik, and Than\u00a0Htut Soe. 2021. Dark patterns in cookie consent notices: new definitions and mitigation strategies. Position Papers of CHI\u201922 \"What Can CHI Do About Dark Patterns?\" (2021). https:\/\/drive.google.com\/file\/d\/1V-P98rH_wqlzLaqY1HZZPDGfdHcCKWBx\/view"},{"key":"e_1_3_3_3_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3501985"},{"key":"e_1_3_3_3_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.2997898"},{"key":"e_1_3_3_3_47_1","doi-asserted-by":"publisher","DOI":"10.4159\/9780674985124"},{"key":"e_1_3_3_3_48_1","volume-title":"Legislating Data Loyalty. Notre Dame Law Review Reflection 97 (June","author":"Hartzog Woodrow","year":"2022","unstructured":"Woodrow Hartzog and Neil\u00a0M. Richards. 2022. Legislating Data Loyalty. Notre Dame Law Review Reflection 97 (June 2022). Issue 356. https:\/\/ssrn.com\/abstract=4131523"},{"key":"e_1_3_3_3_49_1","doi-asserted-by":"crossref","unstructured":"Umar Iqbal Pouneh\u00a0Nikkhah Bahrami Rahmadi Trimananda Hao Cui Alexander Gamero-Garrido Daniel Dubois David Choffnes Athina Markopoulou Franziska Roesner and Zubair Shafiq. 2022. Your Echos are Heard: Tracking Profiling and Ad Targeting in the Amazon Smart Speaker Ecosystem. https:\/\/arxiv.org\/abs\/2204.10920","DOI":"10.1145\/3618257.3624803"},{"key":"e_1_3_3_3_50_1","unstructured":"Dave Johnson and William Antonelli. 2021. The most important Alexa voice commands you can use with your Amazon Echo. https:\/\/www.businessinsider.com\/guides\/tech\/alexa-commands"},{"key":"e_1_3_3_3_51_1","article-title":"Regulating Privacy Dark Patterns in Practice - Drawing Inspiration from the California Privacy Rights Act","volume":"5","author":"King Jennifer","year":"2021","unstructured":"Jennifer King and Adriana Stephan. 2021. Regulating Privacy Dark Patterns in Practice - Drawing Inspiration from the California Privacy Rights Act. Georgetown Law Technology Review 5 (2021), 26\u00a0pages. Issue 250.","journal-title":"Georgetown Law Technology Review"},{"key":"e_1_3_3_3_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3481357.3481516"},{"key":"e_1_3_3_3_53_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2022-0002"},{"key":"e_1_3_3_3_54_1","doi-asserted-by":"publisher","unstructured":"J.\u00a0Richard Landis and Gary\u00a0G. Koch. 1977. The Measurement of Observer Agreement for Categorical Data. Issue 1. https:\/\/doi.org\/10.2307\/2529310","DOI":"10.2307\/2529310"},{"key":"e_1_3_3_3_55_1","doi-asserted-by":"crossref","unstructured":"Eliot Lear Ralph Droms and Dan Romascanu. 2019. Manufacturer Usage Description Specification. RFC 8520. https:\/\/www.rfc-editor.org\/info\/rfc8520","DOI":"10.17487\/RFC8520"},{"key":"e_1_3_3_3_56_1","volume-title":"Can I Delete My Account? Dark Patterns in Account Deletion on Social Media. Position Papers of CHI\u201922 \"What Can CHI Do About Dark Patterns?","author":"Lingareddy Neha","year":"2021","unstructured":"Neha Lingareddy, Brennan Schaffner, and Marshini Chetty. 2021. Can I Delete My Account? Dark Patterns in Account Deletion on Social Media. Position Papers of CHI\u201922 \"What Can CHI Do About Dark Patterns?\" (2021). https:\/\/www.google.com\/url?q=https:\/\/drive.google.com\/file\/d\/190uWk2bhJngE0J_K_kGt2v91z_f01Ocz\/view?usp%3Dsharing&sa=D&source=editors&ust=1619579203736000&usg=AFQjCNHhFRvNyZ0NrYr7AVXUqAKvIKd-tQ"},{"key":"e_1_3_3_3_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2019.8730685"},{"key":"e_1_3_3_3_58_1","unstructured":"Natasha Lomas. 2022. Amazon agrees to drop Prime cancellation \u2018dark patterns\u2019 in Europe. https:\/\/techcrunch.com\/2022\/07\/01\/amazon-ends-prime-cancellation-dark-patterns-europe\/"},{"key":"e_1_3_3_3_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411763.3441360"},{"key":"e_1_3_3_3_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3429290.3429293"},{"key":"e_1_3_3_3_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491101.3519687"},{"key":"e_1_3_3_3_62_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0068"},{"key":"e_1_3_3_3_63_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0075"},{"key":"e_1_3_3_3_64_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0035"},{"key":"e_1_3_3_3_65_1","first-page":"21","article-title":"You offer privacy like you offer tea\u201d: Investigating Mechanisms for Improving Guest Privacy in IoT-Equipped Households","volume":"1","author":"Marky Karola","year":"2022","unstructured":"Karola Marky, Nina Gerber, Michelle\u00a0Gabriela Pelzer, Mohamed Khamis, and Max M\u00fchlh\u00e4user. 2022. \u201cYou offer privacy like you offer tea\u201d: Investigating Mechanisms for Improving Guest Privacy in IoT-Equipped Households. Proceedings on Privacy Enhancing Technologies 1 (2022), 21.","journal-title":"Proceedings on Privacy Enhancing Technologies"},{"key":"e_1_3_3_3_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3334480.3383016"},{"key":"e_1_3_3_3_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359183"},{"key":"e_1_3_3_3_68_1","doi-asserted-by":"crossref","unstructured":"Arunesh Mathur Jonathan Mayer and Kihir Kshirsagar. 2021. What Makes a Dark Pattern... Dark? Design Attributes Normative Considerations and Measurement Methods. https:\/\/arxiv.org\/pdf\/2101.04843.pdf","DOI":"10.1145\/3411764.3445610"},{"key":"e_1_3_3_3_69_1","volume-title":"Characterizing Smart Home IoT Traffic in the Wild. ACM\/IEEE Conference on Internet of Things Design and Implementation (Mar 2020","author":"M.","year":"2001","unstructured":"M.\u00a0Hammad Mazhar and Zubair Shafiq. 2020. Characterizing Smart Home IoT Traffic in the Wild. ACM\/IEEE Conference on Internet of Things Design and Implementation (Mar 2020). http:\/\/arxiv.org\/abs\/2001.08288"},{"key":"e_1_3_3_3_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359174"},{"key":"e_1_3_3_3_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411763.3451659"},{"key":"e_1_3_3_3_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491101.3519829"},{"key":"e_1_3_3_3_73_1","unstructured":"Sara Morrison. 2021. Dark patterns the tricks websites use to make you say yes explained. https:\/\/www.vox.com\/recode\/22351108\/dark-patterns-ui-web-design-privacy"},{"key":"e_1_3_3_3_74_1","volume-title":"Proc. of USENIX Security Symposium. 399\u2013412","author":"Naeini Pardis\u00a0Emami","year":"2017","unstructured":"Pardis\u00a0Emami Naeini, Sruti Bhagavatula, Hana Habib, Martin Degeling, Lujo Bauer, Lorrie\u00a0Faith Cranor, and Norman Sadeh. 2017. Privacy Expectations and Preferences in an IoT World. In Proc. of USENIX Security Symposium. 399\u2013412. https:\/\/www.usenix.org\/conference\/soups2017\/technical-sessions\/presentation\/naeini"},{"key":"e_1_3_3_3_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/3397884"},{"key":"e_1_3_3_3_76_1","volume-title":"Cookies: the CNIL fines GOOGLE a total of 150 million euros and FACEBOOK 60 million euros for non-compliance with French legislation. (January","author":"Commission nationale de l\u2019informatique et des\u00a0libert\u00e9s (CNIL). 2022.","year":"2022","unstructured":"Commission nationale de l\u2019informatique et des\u00a0libert\u00e9s (CNIL). 2022. Cookies: the CNIL fines GOOGLE a total of 150 million euros and FACEBOOK 60 million euros for non-compliance with French legislation. (January 2022). https:\/\/www.cnil.fr\/en\/cookies-cnil-fines-google-total-150-million-euros-and-facebook-60-million-euros-non-compliance"},{"key":"e_1_3_3_3_77_1","volume-title":"Tech has an Attention Problem","author":"Nielsen Aileen","year":"2022","unstructured":"Aileen Nielsen. 2022. Tech has an Attention Problem. Berkeley Center for Long-Term Cybersecurity Whitepapers (2022). https:\/\/cltc.berkeley.edu\/wp-content\/uploads\/2021\/09\/CLTC_Techs_Attention_Problem.pdf"},{"key":"e_1_3_3_3_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376321"},{"key":"e_1_3_3_3_79_1","unstructured":"SIG on\u00a0Governing\u00a0the Social\u00a0Media and Data Economy. 2022. Futureproof Methods for Measuring and Detecting Dark Patterns. https:\/\/www.uu.nl\/en\/events\/future-proof-methods-for-measuring-and-detecting-dark-patterns"},{"key":"e_1_3_3_3_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/3549015.3554213"},{"key":"e_1_3_3_3_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/3487552.3487830"},{"key":"e_1_3_3_3_82_1","unstructured":"European Parliament and Council of European\u00a0Union. 2016. EU General Data Protection Regulation (GDPR). https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/HTML\/?uri=CELEX:32016R0679&from=EN."},{"key":"e_1_3_3_3_83_1","unstructured":"David Priest Tauren Dyson and Taylor Martin. 2022. Every Alexa command you can give your speaker. https:\/\/www.cnet.com\/how-to\/every-alexa-command-you-can-give-your-amazon-echo-smart-speaker\/"},{"key":"e_1_3_3_3_84_1","unstructured":"Eric Ravenscraft. 2020. How to Spot\u2014and Avoid\u2014Dark Patterns on the Web. https:\/\/www.wired.com\/story\/how-to-spot-avoid-dark-patterns\/"},{"key":"e_1_3_3_3_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/3355369.3355577"},{"key":"e_1_3_3_3_86_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.13"},{"key":"e_1_3_3_3_87_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.14"},{"key":"e_1_3_3_3_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419394.3423650"},{"key":"e_1_3_3_3_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555142"},{"key":"e_1_3_3_3_90_1","unstructured":"California Legislature (2021-2022\u00a0Regular Session). 2022. California Age-Appropriate Design Code Act. https:\/\/leginfo.legislature.ca.gov\/faces\/billTextClient.xhtml?bill_id=202120220AB2273"},{"key":"e_1_3_3_3_91_1","unstructured":"Stanford Digital\u00a0Civil Society. 2021. Dark Patterns Tip Line. https:\/\/darkpatternstipline.org"},{"key":"e_1_3_3_3_92_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419249.3420132"},{"key":"e_1_3_3_3_93_1","volume-title":"Online Manipulation: Hidden Influences in a Digital World.","author":"Susser Daniel","year":"2019","unstructured":"Daniel Susser, Beate Roessler, and Helen Nissenbaum. 2019. Online Manipulation: Hidden Influences in a Digital World."},{"key":"e_1_3_3_3_94_1","volume-title":"Nudge: Improving Decisions About Health, Wealth, and Happiness","author":"Thaler H.","year":"2008","unstructured":"Richard\u00a0H. Thaler and Cass\u00a0R. Sunstein. 2008. Nudge: Improving Decisions About Health, Wealth, and Happiness. Yale University Press."},{"key":"e_1_3_3_3_95_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2020-0021"},{"key":"e_1_3_3_3_96_1","unstructured":"Megan Wollerton. 2020. Wink\u2019s subscription plan kicks off July 27. https:\/\/www.cnet.com\/home\/smart-home\/winks-subscription-plan-kicks-off-july-27\/"},{"key":"e_1_3_3_3_97_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359161"},{"key":"e_1_3_3_3_98_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134052"},{"key":"e_1_3_3_3_99_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274469"},{"key":"e_1_3_3_3_100_1","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Zhou Wei","year":"2019","unstructured":"Wei Zhou, Yan Jia, Yao Yao, Lipeng Zhu, Le Guan, Yuhang Mao, Peng Liu, and Yuqing Zhang. 2019. Discovering and Understanding the Security Hazards in the Interactions between IoT Devices, Mobile Apps, and Clouds on Smart Home Platforms. In 28th USENIX Security Symposium (USENIX Security 19). 1133\u20131150."},{"key":"e_1_3_3_3_101_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341325.3342000"}],"event":{"name":"CHI '23: CHI Conference on Human Factors in Computing Systems","location":"Hamburg Germany","acronym":"CHI '23","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544548.3581432","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3544548.3581432","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3544548.3581432","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:55Z","timestamp":1750178815000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544548.3581432"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,19]]},"references-count":99,"alternative-id":["10.1145\/3544548.3581432","10.1145\/3544548"],"URL":"https:\/\/doi.org\/10.1145\/3544548.3581432","relation":{},"subject":[],"published":{"date-parts":[[2023,4,19]]},"assertion":[{"value":"2023-04-19","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}