{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T22:39:30Z","timestamp":1776119970403,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,4,19]],"date-time":"2023-04-19T00:00:00Z","timestamp":1681862400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Luxembourg National Research Fund","award":["IS\/14717072"],"award-info":[{"award-number":["IS\/14717072"]}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1909714"],"award-info":[{"award-number":["1909714"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,4,19]]},"DOI":"10.1145\/3544549.3583745","type":"proceedings-article","created":{"date-parts":[[2023,4,20]],"date-time":"2023-04-20T07:31:00Z","timestamp":1681975860000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Emerging Transdisciplinary Perspectives to Confront Dark Patterns"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7307-1550","authenticated-orcid":false,"given":"Colin M.","family":"Gray","sequence":"first","affiliation":[{"name":"Purdue University, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2294-0119","authenticated-orcid":false,"given":"Shruthi Sai","family":"Chivukula","sequence":"additional","affiliation":[{"name":"Indiana University, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9139-1622","authenticated-orcid":false,"given":"Kerstin","family":"Bongard-Blanchy","sequence":"additional","affiliation":[{"name":"Human-Computer Interaction Research Group, University of Luxembourg, Luxembourg"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3719-676X","authenticated-orcid":false,"given":"Arunesh","family":"Mathur","sequence":"additional","affiliation":[{"name":"Competition and Markets Authority, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5813-9019","authenticated-orcid":false,"given":"Johanna T.","family":"Gunawan","sequence":"additional","affiliation":[{"name":"Khoury College of Computer Sciences, Northeastern University, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1680-9483","authenticated-orcid":false,"given":"Brennan","family":"Schaffner","sequence":"additional","affiliation":[{"name":"University of Chicago, United States"}]}],"member":"320","published-online":{"date-parts":[[2023,4,19]]},"reference":[{"key":"e_1_3_3_2_1_1","unstructured":"2021. Bringing dark patterns to light: An FTC workshop. https:\/\/www.ftc.gov\/news-events\/events-calendar\/bringing-dark-patterns-light-ftc-workshop. https:\/\/www.ftc.gov\/news-events\/events-calendar\/bringing-dark-patterns-light-ftc-workshop Accessed: 2021-4-8."},{"key":"e_1_3_3_2_2_1","first-page":"L277","article-title":"Regulation (EU) 2022\/2065 of the European Parliament and of the Council of 19 October 2022 on a Single Market For Digital Services and amending Directive 2000\/31\/EC (Digital Services Act)","volume":"65","year":"2022","unstructured":"2022. Regulation (EU) 2022\/2065 of the European Parliament and of the Council of 19 October 2022 on a Single Market For Digital Services and amending Directive 2000\/31\/EC (Digital Services Act). Official Journal of the European Union 65, L277 (Oct. 2022).","journal-title":"Official Journal of the European Union"},{"key":"e_1_3_3_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3461778.3462086"},{"key":"e_1_3_3_2_4_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0038"},{"key":"e_1_3_3_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445375"},{"key":"e_1_3_3_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376600"},{"key":"e_1_3_3_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3170427.3188553"},{"key":"e_1_3_3_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3311927.3323136"},{"key":"e_1_3_3_2_9_1","volume-title":"Value Sensitive Design: Shaping Technology with Moral Imagination","author":"Friedman Batya","unstructured":"Batya Friedman and David\u00a0G Hendry. 2019. Value Sensitive Design: Shaping Technology with Moral Imagination. MIT Press. https:\/\/market.android.com\/details?id=book-C4FruwEACAAJ"},{"key":"e_1_3_3_2_10_1","doi-asserted-by":"publisher","DOI":"10.33621\/jdsr.v3i1.54"},{"key":"e_1_3_3_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479516"},{"key":"e_1_3_3_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3449144"},{"key":"e_1_3_3_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357236.3395486"},{"key":"e_1_3_3_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174108"},{"key":"e_1_3_3_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445779"},{"key":"e_1_3_3_2_16_1","volume-title":"The COVID-19 Pandemic and the Technology Trust Gap. Seton Hall Law Review Symposium Book on Privacy, Healthcare, and Artificial Intelligence 51(2021)","author":"Gunawan Johanna","year":"2021","unstructured":"Johanna Gunawan, David Choffnes, Woodrow Hartzog, and Christo Wilson. 2021. The COVID-19 Pandemic and the Technology Trust Gap. Seton Hall Law Review Symposium Book on Privacy, Healthcare, and Artificial Intelligence 51(2021). Issue 5."},{"key":"e_1_3_3_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479521"},{"key":"e_1_3_3_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3511265.3550448"},{"key":"e_1_3_3_2_19_1","unstructured":"Jennifer King and Adriana Stephan. 2021. Regulating Privacy Dark Patterns in Practice\u2014Drawing Inspiration from California Privacy Rights Act. Georgetown Law Technology Review(2021). https:\/\/georgetownlawtechreview.org\/regulating-privacy-dark-patterns-in-practice-drawing-inspiration-from-california-privacy-rights-act\/GLTR-09-2021\/"},{"key":"e_1_3_3_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411763.3441360"},{"key":"e_1_3_3_2_21_1","doi-asserted-by":"publisher","DOI":"10.17011\/ht"},{"key":"e_1_3_3_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359183"},{"key":"e_1_3_3_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445610"},{"key":"e_1_3_3_2_24_1","unstructured":"Mike Monteiro. 2019. Ruined by Design: How Designers Destroyed the World and what We Can Do to Fix it. Mule Design.https:\/\/play.google.com\/store\/books\/details?id=haS0wwEACAAJ"},{"key":"e_1_3_3_2_25_1","volume-title":"Evil by Design: Interaction Design to Lead Us into Temptation","author":"Nodder Chris","unstructured":"Chris Nodder. 2013. Evil by Design: Interaction Design to Lead Us into Temptation. John Wiley & Sons, Inc., Indianapolis, IN. 303 pages. https:\/\/market.android.com\/details?id=book-46Wl1G9yJUoC"},{"key":"e_1_3_3_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376321"},{"key":"e_1_3_3_2_27_1","volume-title":"Let\u2019s Talk About Socio-Technical Angst: Tracing the History and Evolution of Dark Patterns on Twitter from 2010-2021. (July","author":"Obi Ikechukwu","year":"2022","unstructured":"Ikechukwu Obi, Colin\u00a0M Gray, Shruthi\u00a0Sai Chivukula, Ja-Nae Duane, Janna Johns, Matthew Will, Ziqing Li, and Thomas Carlock. 2022. Let\u2019s Talk About Socio-Technical Angst: Tracing the History and Evolution of Dark Patterns on Twitter from 2010-2021. (July 2022). arxiv:2207.10563\u00a0[cs.SI] http:\/\/arxiv.org\/abs\/2207.10563"},{"key":"e_1_3_3_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3463676.3485611"},{"key":"e_1_3_3_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555142"},{"key":"e_1_3_3_2_30_1","doi-asserted-by":"publisher","unstructured":"Katie Shilton. 2018. Values and Ethics in Human-Computer Interaction. Foundations and Trends\u00ae Human\u2013Computer Interaction 12 2(2018) 107\u2013171. https:\/\/doi.org\/10.1561\/1100000073","DOI":"10.1561\/1100000073"},{"key":"e_1_3_3_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419249.3420132"},{"key":"e_1_3_3_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411763.3451805"}],"event":{"name":"CHI '23: CHI Conference on Human Factors in Computing Systems","location":"Hamburg Germany","acronym":"CHI '23","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544549.3583745","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3544549.3583745","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3544549.3583745","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:47:44Z","timestamp":1750178864000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544549.3583745"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,19]]},"references-count":32,"alternative-id":["10.1145\/3544549.3583745","10.1145\/3544549"],"URL":"https:\/\/doi.org\/10.1145\/3544549.3583745","relation":{},"subject":[],"published":{"date-parts":[[2023,4,19]]},"assertion":[{"value":"2023-04-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}