{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T14:29:31Z","timestamp":1760711371991,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,6,3]],"date-time":"2024-06-03T00:00:00Z","timestamp":1717372800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100006374","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","award":["RGPIN-2021-0352"],"award-info":[{"award-number":["RGPIN-2021-0352"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,6,3]]},"DOI":"10.1145\/3630106.3659046","type":"proceedings-article","created":{"date-parts":[[2024,6,5]],"date-time":"2024-06-05T09:14:21Z","timestamp":1717578861000},"page":"2421-2431","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Drivers and persuasive strategies to influence user intention to learn about manipulative design"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0640-9264","authenticated-orcid":false,"given":"Pooria","family":"Babaei","sequence":"first","affiliation":[{"name":"University of Saskatchewan, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5050-3106","authenticated-orcid":false,"given":"Julita","family":"Vassileva","sequence":"additional","affiliation":[{"name":"University of Saskatchewan, Canada"}]}],"member":"320","published-online":{"date-parts":[[2024,6,5]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Structural equation modeling in practice: A review and recommended two-step approach.Psychological bulletin 103, 3","author":"Anderson C","year":"1988","unstructured":"James\u00a0C Anderson and David\u00a0W Gerbing. 1988. Structural equation modeling in practice: A review and recommended two-step approach.Psychological bulletin 103, 3 (1988), 411."},{"key":"e_1_3_2_1_2_1","volume-title":"Computer-mediated trust in self-interested expert recommendations. Cognition beyond the brain: Computation, interactivity and human artifice","author":"Ben-Naim Jonathan","year":"2017","unstructured":"Jonathan Ben-Naim, Jean-Fran\u00e7ois Bonnefon, Andreas Herzig, Sylvie Leblois, and Emiliano Lorini. 2017. Computer-mediated trust in self-interested expert recommendations. Cognition beyond the brain: Computation, interactivity and human artifice (2017), 233\u2013250."},{"key":"e_1_3_2_1_3_1","volume-title":"End-User Perspective. In Designing Interactive Systems Conference","author":"Bongard-Blanchy Kerstin","year":"2021","unstructured":"Kerstin Bongard-Blanchy, Arianna Rossi, Salvador Rivas, Sophie Doublet, Vincent Koenig, and Gabriele Lenzini. 2021. \u201d I am Definitely Manipulated, Even When I am Aware of it. It\u2019s Ridiculous!\u201d-Dark Patterns from the End-User Perspective. In Designing Interactive Systems Conference 2021. 763\u2013776."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2015\/39.4.5"},{"key":"e_1_3_2_1_5_1","first-page":"2","article-title":"Dark patterns: Deception vs. honesty in UI design","volume":"338","author":"Brignull Harry","year":"2011","unstructured":"Harry Brignull. 2011. Dark patterns: Deception vs. honesty in UI design. Interaction Design, Usability 338 (2011), 2\u20134.","journal-title":"Interaction Design, Usability"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37893-5_18"},{"key":"e_1_3_2_1_7_1","volume-title":"2009 42nd Hawaii International Conference on System Sciences. IEEE, 1\u201310","author":"Chenoweth Tim","year":"2009","unstructured":"Tim Chenoweth, Robert Minch, and Tom Gattiker. 2009. Application of protection motivation theory to adoption of protective technologies. In 2009 42nd Hawaii International Conference on System Sciences. IEEE, 1\u201310."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3197391.3205417"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican0201-76"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1177\/001088040204300204"},{"volume-title":"Number of mobile app downloads worldwide from 2016 to","year":"2022","key":"e_1_3_2_1_11_1","unstructured":"Data.ai. 2023. Number of mobile app downloads worldwide from 2016 to 2022. https:\/\/www.statista.com\/statistics\/271644\/worldwide-free-and-paid-mobile-app-store-downloads Accessed: 2023-04-25."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376600"},{"volume-title":"Number of smartphone mobile network subscriptions worldwide from 2016 to","year":"2022","key":"e_1_3_2_1_13_1","unstructured":"Ericsson. 2022. Number of smartphone mobile network subscriptions worldwide from 2016 to 2022, with forecasts from 2023 to 2028. https:\/\/www.statista.com\/statistics\/330695\/number-of-smartphone-users-worldwide Accessed: 2023-04-25."},{"key":"e_1_3_2_1_14_1","volume-title":"Complaint of the Federal Trade Commission v. Epic Games","author":"Federal Trade Commission","year":"1923","unstructured":"Federal Trade Commission. 2023. Complaint of the Federal Trade Commission v. Epic Games, Inc.https:\/\/www.ftc.gov\/system\/files\/ftc_gov\/pdf\/1923203epicgamesfinalconsent.pdf Accessed: November 03, 2023."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/764008.763957"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1177\/002224378101800104"},{"key":"e_1_3_2_1_17_1","unstructured":"French Data Protection. 2022. Complaint of the French Data Protection Authority (DPA) v. TikTok. https:\/\/www.legifrance.gouv.fr\/cnil\/id\/CNILTEXT000046977994?page=1&pageSize=10&query=2016%252F679&searchField=ALL&searchType=ALL&sortValue=DATE_DECISION_DESC&tab_selection=cnil&typePagination=DEFAULT Accessed: November 03 2023."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411763.3451781"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"PAJ Gra\u00dfl HK Schraffenberger FJ Zuiderveen\u00a0Borgesius and MA Buijzen. 2021. Dark and bright patterns in cookie consent requests. (2021).","DOI":"10.31234\/osf.io\/gqs5h"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479516"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174108"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2598510.2598541"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.2753\/MTP1069-6679190202"},{"key":"e_1_3_2_1_24_1","unstructured":"Brignull Harry. 2021. Deceptive Design. https:\/\/deceptive.design Accessed: 2023-04-03."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11747-014-0403-8"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03655-2_13"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2885.1994.tb00081.x"},{"key":"e_1_3_2_1_28_1","volume-title":"Are attention check questions a threat to scale validity?Applied Psychology 67, 2","author":"Kung YH","year":"2018","unstructured":"Franki\u00a0YH Kung, Navio Kwok, and Douglas\u00a0J Brown. 2018. Are attention check questions a threat to scale validity?Applied Psychology 67, 2 (2018), 264\u2013283."},{"key":"e_1_3_2_1_29_1","volume-title":"\u2019Dark Patterns\u2019: the case for regulatory pluralism. Available at SSRN 3625637","author":"Leiser MR","year":"2020","unstructured":"MR Leiser. 2020. \u2019Dark Patterns\u2019: the case for regulatory pluralism. Available at SSRN 3625637 (2020)."},{"key":"e_1_3_2_1_30_1","volume-title":"From Awareness to Action: Exploring End-User Empowerment Interventions for Dark Patterns in UX. arXiv preprint arXiv:2310.17846","author":"Lu Yuwen","year":"2023","unstructured":"Yuwen Lu, Chao Zhang, Yuewen Yang, Yaxing Yao, and Toby Jia-Jun Li. 2023. From Awareness to Action: Exploring End-User Empowerment Interventions for Dark Patterns in UX. arXiv preprint arXiv:2310.17846 (2023)."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1093\/jla\/laaa006"},{"volume-title":"IndiaHCI\u201920: Proceedings of the 11th Indian Conference on Human-Computer Interaction. 24\u201333","author":"Bhoot Aditi","key":"e_1_3_2_1_32_1","unstructured":"Aditi M.\u00a0Bhoot, Mayuri A.\u00a0Shinde, and Wricha P.\u00a0Mishra. 2020. Towards the identification of dark patterns: An analysis based on end-user reactions. In IndiaHCI\u201920: Proceedings of the 11th Indian Conference on Human-Computer Interaction. 24\u201333."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.17011\/ht\/urn.202008245641"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00166"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.2007.00930.x"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359183"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.09.014"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300472"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1111\/0272-4332.205065"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376321"},{"key":"e_1_3_2_1_41_1","volume-title":"Mobile Persuasive Application for Responsible Alcohol Use: Drivers for Use and Impact of Social Influence Strategies. In International Conference on Persuasive Technology. Springer, 102\u2013114","author":"Olagunju Abdul-Hammid","year":"2021","unstructured":"Abdul-Hammid Olagunju, Marcella Ogenchuk, and Julita Vassileva. 2021. Mobile Persuasive Application for Responsible Alcohol Use: Drivers for Use and Impact of Social Influence Strategies. In International Conference on Persuasive Technology. Springer, 102\u2013114."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1108\/OIR-01-2014-0006"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"crossref","unstructured":"Peterson\u00a0K Ozili. 2023. The acceptable R-square in empirical modelling for social science research. In Social research methodology and publishing results: A guide to non-native english speakers. IGI Global 134\u2013143.","DOI":"10.4018\/978-1-6684-6859-3.ch009"},{"key":"e_1_3_2_1_44_1","volume-title":"Editor","author":"Ringle M","year":"2012","unstructured":"Christian\u00a0M Ringle, Marko Sarstedt, and Detmar\u00a0W Straub. 2012. Editor\u2019s comments: a critical look at the use of PLS-SEM in\" MIS Quarterly\". MIS quarterly (2012), iii\u2013xiv."},{"key":"e_1_3_2_1_45_1","volume-title":"A protection motivation theory of fear appeals and attitude change1. The journal of psychology 91, 1","author":"Rogers W","year":"1975","unstructured":"Ronald\u00a0W Rogers. 1975. A protection motivation theory of fear appeals and attitude change1. The journal of psychology 91, 1 (1975), 93\u2013114."},{"key":"e_1_3_2_1_46_1","volume-title":"Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation. Social psychology: A source book","author":"Rogers W","year":"1983","unstructured":"Ronald\u00a0W Rogers. 1983. Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation. Social psychology: A source book (1983), 153\u2013176."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2009.02.012"},{"volume-title":"November 04","year":"2023","key":"e_1_3_2_1_48_1","unstructured":"year = 2022 note =\u00a0Accessed: November 04, 2023 SUPERIOR COURT OF THE DISTRICT OF COLUMBIACIVIL DIVISION, url =\u00a0https:\/\/oag.dc.gov\/sites\/default\/files\/2022-12\/2022.12.30%20Consent%20Judgment%20and%20Order.pdf. [n. d.]. Complaint of DISTRICT OF COLUMBIA v. GrubHub, Inc."},{"key":"e_1_3_2_1_49_1","volume-title":"Decision Making and Website Reputation. In International Conference on Persuasive Technology. Springer, 36\u201350","author":"Tasneem\u00a0Naheyan Kiemute\u00a0Oyibo","year":"2024","unstructured":"Kiemute\u00a0Oyibo Tasneem\u00a0Naheyan. 2024. The Effect of Dark Patterns and User Knowledge on User Experience, Decision Making and Website Reputation. In International Conference on Persuasive Technology. Springer, 36\u201350."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354212"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102839"},{"key":"e_1_3_2_1_52_1","unstructured":"Susan Weinschenk. 2013. How to get people to do stuff: Master the art and science of persuasion and motivation. New Riders."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyaa001"},{"key":"e_1_3_2_1_54_1","volume-title":"Wilcoxon signed-rank test","author":"Woolson F","year":"2007","unstructured":"Robert\u00a0F Woolson. 2007. Wilcoxon signed-rank test. Wiley encyclopedia of clinical trials (2007), 1\u20133."},{"key":"e_1_3_2_1_55_1","unstructured":"Yoram Wurmser. 2020. The Majority of Americans\u2019 Mobile Time Spent Takes Place in Apps. https:\/\/www.insiderintelligence.com\/content\/the-majority-of-americans-mobile-time-spent-takes-place-in-apps Accessed: 2023-04-25."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1518\/107118191786754662"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/NSWCTC.2009.305"}],"event":{"name":"FAccT '24: The 2024 ACM Conference on Fairness, Accountability, and Transparency","acronym":"FAccT '24","location":"Rio de Janeiro Brazil"},"container-title":["The 2024 ACM Conference on Fairness Accountability and Transparency"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3630106.3659046","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3630106.3659046","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T17:29:22Z","timestamp":1755883762000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3630106.3659046"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,3]]},"references-count":57,"alternative-id":["10.1145\/3630106.3659046","10.1145\/3630106"],"URL":"https:\/\/doi.org\/10.1145\/3630106.3659046","relation":{},"subject":[],"published":{"date-parts":[[2024,6,3]]},"assertion":[{"value":"2024-06-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}