{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T23:34:39Z","timestamp":1776123279956,"version":"3.50.1"},"reference-count":136,"publisher":"Association for Computing Machinery (ACM)","issue":"CSCW1","license":[{"start":{"date-parts":[[2024,4,17]],"date-time":"2024-04-17T00:00:00Z","timestamp":1713312000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Fundation","doi-asserted-by":"crossref","award":["CMMI-2326378"],"award-info":[{"award-number":["CMMI-2326378"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2024,4,17]]},"abstract":"<jats:p>The study of UX dark patterns, i.e., UI designs that seek to manipulate user behaviors, often for the benefit of online services, has drawn significant attention in the CHI and CSCW communities in recent years. To complement previous studies in addressing dark patterns from (1) the designer's perspective on education and advocacy for ethical designs; and (2) the policymaker's perspective on new regulations, we propose an end-user-empowerment intervention approach that helps users (1) raise the awareness of dark patterns and understand their underlying design intents; (2) take actions to counter the effects of dark patterns using a web augmentation approach. Through a two-phase co-design study, including 5 co-design workshops (N=12) and a 2-week technology probe study (N=15), we reported findings on the understanding of users' needs, preferences, and challenges in handling dark patterns and investigated the feedback and reactions to users' awareness of and action on dark patterns being empowered in a realistic in-situ setting.<\/jats:p>","DOI":"10.1145\/3637336","type":"journal-article","created":{"date-parts":[[2024,4,29]],"date-time":"2024-04-29T10:05:31Z","timestamp":1714385131000},"page":"1-41","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["From Awareness to Action: Exploring End-User Empowerment Interventions for Dark Patterns in UX"],"prefix":"10.1145","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0845-5563","authenticated-orcid":false,"given":"Yuwen","family":"Lu","sequence":"first","affiliation":[{"name":"University of Notre Dame, Notre Dame, IN, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4286-8468","authenticated-orcid":false,"given":"Chao","family":"Zhang","sequence":"additional","affiliation":[{"name":"Cornell University, Ithaca, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5490-314X","authenticated-orcid":false,"given":"Yuewen","family":"Yang","sequence":"additional","affiliation":[{"name":"Cornell Tech, New York, NY, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-7900-9265","authenticated-orcid":false,"given":"Yaxing","family":"Yao","sequence":"additional","affiliation":[{"name":"Virginia Tech, Blacksburg, VA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7902-7625","authenticated-orcid":false,"given":"Toby Jia-Jun","family":"Li","sequence":"additional","affiliation":[{"name":"University of Notre Dame, Notre Dame, IN, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,4,26]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491101.3519837"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-022-09672--9"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1509\/jm.15.0481"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544549.3585668"},{"key":"e_1_2_1_5_1","unstructured":"Amazon. 2022. Items on Amazon may display a List Price Was Price or other strike-through pricing or saving information on the product detail page. https:\/\/www.amazon.com\/gp\/help\/customer\/display.html?nodeId=GQ6B6RH72AX8D2TD&ref_=dp_hp"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1086\/338209"},{"key":"e_1_2_1_7_1","unstructured":"European Data Protection Board. 2020. Guidelines 05\/2020 on consent under Regulation 2016\/679. https:\/\/edpb.europa.eu\/our-work-tools\/our-documents\/guidelines\/guidelines-052020-consent-under-regulation-2016679_en"},{"key":"e_1_2_1_8_1","unstructured":"European Data Protection Board. 2022. Guidelines 3\/2022 on Dark Patterns in Social Media Platform Interfaces: How to Recognise and Avoid Them. Technical Report. European Data Protection Board Brussels Belgique."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.1999.772892"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095034.1095062"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3461778.3462086"},{"key":"e_1_2_1_12_1","volume-title":"Science","volume":"343","author":"Bonney Rick","year":"2014","unstructured":"Rick Bonney, Jennifer L Shirk, Tina B Phillips, Andrea Wiggins, Heidi L Ballard, Abraham J Miller-Rushing, and Julia K Parrish. 2014. Next steps for citizen science. Science, Vol. 343, 6178 (2014), 1436--1437."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.4324\/9780203805527"},{"key":"e_1_2_1_14_1","volume-title":"Using thematic analysis in psychology. Qualitative research in psychology","author":"Braun Virginia","year":"2006","unstructured":"Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative research in psychology, Vol. 3, 2 (2006), 77--101."},{"key":"e_1_2_1_15_1","unstructured":"Harry Brignull. 2010. Deceptive design - Types of deceptive design. https:\/\/www.deceptive.design\/types"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0038"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300733"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208740"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3532106.3533562"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3532106.3533562"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3197391.3205417"},{"key":"e_1_2_1_22_1","unstructured":"Federal Trade Commision. 2022. Bringing Dark Patterns to Light. Technical Report. Federal Trade Commision. 48 pages."},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.2838\/859030"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772719"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3126594.3126651"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376600"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.21427\/2Y2Q-6323"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3272973.3274542"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3172944.3172961"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998210"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-19890-3_11"},{"key":"e_1_2_1_32_1","unstructured":"United States Senator Deb Fischer. 2019. Senators Introduce Bipartisan Legislation to Ban Manipulative 'Dark Patterns'. http:\/\/www.fischer.senate.gov\/public\/index.cfm\/2019\/4\/senators-introduce-bipartisan-legislation-to-ban-manipulative-dark-patterns"},{"key":"e_1_2_1_33_1","volume-title":"Web design by example. Thesis","author":"Fitzgerald Michael J.","year":"2009","unstructured":"Michael J. Fitzgerald. 2008. CopyStyler : Web design by example. Thesis. Massachusetts Institute of Technology. https:\/\/dspace.mit.edu\/handle\/1721.1\/46032 Accepted: 2009-06--30T17:06:01Z Journal Abbreviation: Web design by example."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411763.3450404"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479516"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544549.3583745"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357236.3395486"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174108"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","unstructured":"Colin M. Gray Lorena Sanchez Chamorro Ike Obi and Ja-Nae Duane. 2023 b. Mapping the Landscape of Dark Patterns Scholarship: A Systematic Literature Review. In Companion Publication of the 2023 ACM Designing Interactive Systems Conference (DIS '23 Companion). Association for Computing Machinery New York NY USA 188--193. https:\/\/doi.org\/10.1145\/3563703.3596635","DOI":"10.1145\/3563703.3596635"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544549.3585676"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","unstructured":"Colin M. Gray Cristiana Teixeira Santos Nicole Tong Thomas Mildner Arianna Rossi Johanna T. Gunawan and Caroline Sinders. 2023 d. Dark Patterns and the Emerging Threats of Deceptive Design Practices. In Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems (CHI EA '23). Association for Computing Machinery New York NY USA 1--4. https:\/\/doi.org\/10.1145\/3544549.3583173","DOI":"10.1145\/3544549.3583173"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.33621\/jdsr.v3i1.54"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2598510.2598541"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479521"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3511265.3550448"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1017\/S1867299X00002762"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1177\/1745691617702496"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580942"},{"key":"e_1_2_1_49_1","volume-title":"Impulse and self-control from a dual-systems perspective. Perspectives on psychological science","author":"Hofmann Wilhelm","year":"2009","unstructured":"Wilhelm Hofmann, Malte Friese, and Fritz Strack. 2009. Impulse and self-control from a dual-systems perspective. Perspectives on psychological science, Vol. 4, 2 (2009), 162--176."},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300334"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642616"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491101.3504030"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517602"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376219"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3546155.3546656"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3501931"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411763.3451632"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581432"},{"key":"e_1_2_1_59_1","volume-title":"User friendly: How the hidden rules of design are changing the way we live, work & play","author":"Kuang Cliff","unstructured":"Cliff Kuang and Robert Fabricant. 2019. User friendly: How the hidden rules of design are changing the way we live, work & play. Random House, New York."},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979262"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/HRI.2019.8673274"},{"key":"e_1_2_1_62_1","volume-title":"UM99 User Modeling","author":"Langley Pat","unstructured":"Pat Langley. 1999. User modeling in adaptive interface. In UM99 User Modeling. Springer, Udine, Italy, 357--370."},{"key":"e_1_2_1_63_1","volume-title":"Jinjuan Heidi Feng, and Harry Hochheiser","author":"Lazar Jonathan","year":"2017","unstructured":"Jonathan Lazar, Jinjuan Heidi Feng, and Harry Hochheiser. 2017. Research methods in human-computer interaction. Morgan Kaufmann, Chichester, West Sussex, U.K."},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753667"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3625637"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4302-6422-4"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025483"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445049"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3332165.3347899"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3210240.3210339"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3242587.3242660"},{"key":"e_1_2_1_72_1","unstructured":"Evan Zheran Liu Kelvin Guu Panupong Pasupat Tianlin Shi and Percy Liang. 2018. Reinforcement Learning on Web Interfaces Using Workflow-Guided Exploration. http:\/\/arxiv.org\/abs\/1802.08802 arXiv:1802.08802 [cs]."},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1093\/jla\/laaa006"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411763.3441360"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376672"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/3429290.3429293"},{"key":"e_1_2_1_77_1","unstructured":"Maximilian Maier. 2019. Dark patterns--An end user perspective."},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.17011\/ht\/urn.202008245641"},{"key":"e_1_2_1_79_1","unstructured":"SM Mansur Sabiha Salma Damilola Awofisayo and Kevin Moran. 2023. AidUI: Toward Automated Recognition of Dark Patterns in User Interfaces."},{"key":"e_1_2_1_80_1","unstructured":"Autoriteit Consument & Markt. 2020. Guidelines on the protection of the online consumer textbar ACM. nl. https:\/\/www.acm.nl\/en\/publications\/guidelines-protection-online-consumer Last Modified: 2020--11--23T14:40:370100."},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359183"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445610"},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274388"},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359174"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/3563657.3595964"},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411763.3451659"},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580695"},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240832"},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300472"},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/153571.255960"},{"key":"e_1_2_1_91_1","volume-title":"Mary Beth Kery, and Toby Jia-Jun Li","author":"Myers Brad A","year":"2017","unstructured":"Brad A Myers, Andrew J Ko, Chris Scaffidi, Stephen Oney, YoungSeok Yoon, Kerry Chang, Mary Beth Kery, and Toby Jia-Jun Li. 2017. Making end user development more natural. In New perspectives in end-user development. Springer, New York, NY, 1--22."},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1145\/3400899.3400901"},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858048"},{"key":"e_1_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1145\/2494603.2480304"},{"key":"e_1_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1145\/2494603.2480304"},{"key":"e_1_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1145\/1614390.1614392"},{"key":"e_1_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1145\/571985.572008"},{"key":"e_1_2_1_98_1","volume-title":"Science","volume":"348","author":"Nosek Brian A","year":"2015","unstructured":"Brian A Nosek, George Alter, George C Banks, Denny Borsboom, Sara D Bowman, Steven J Breckler, Stuart Buck, Christopher D Chambers, Gilbert Chin, Garret Christensen, et al. 2015. Promoting an open research culture. Science, Vol. 348, 6242 (2015), 1422--1425."},{"key":"e_1_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1708274114"},{"key":"e_1_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491101.3519683"},{"key":"e_1_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376321"},{"key":"e_1_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394978"},{"key":"e_1_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394978"},{"key":"e_1_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.1145\/2468356.2468690"},{"key":"e_1_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1145\/3531073.3531089"},{"key":"e_1_2_1_106_1","volume-title":"A protection motivation theory of fear appeals and attitude change. The journal of psychology","author":"Rogers Ronald W.","year":"1975","unstructured":"Ronald W. Rogers. 1975. A protection motivation theory of fear appeals and attitude change. The journal of psychology, Vol. 91, 1 (1975), 93--114. Publisher: Taylor & Francis."},{"key":"e_1_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555142"},{"key":"e_1_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376264"},{"key":"e_1_2_1_109_1","doi-asserted-by":"crossref","unstructured":"Ben Shneiderman. 2022. Human-centered AI. Oxford University Press.","DOI":"10.1093\/oso\/9780192845290.001.0001"},{"key":"e_1_2_1_110_1","doi-asserted-by":"publisher","DOI":"10.1017\/bpp.2022.11"},{"key":"e_1_2_1_111_1","volume-title":"The most powerful way to turn clicks into customers","author":"Siroker Dan","unstructured":"Dan Siroker and Pete Koomen. 2015. A\/B testing: The most powerful way to turn clicks into customers. John Wiley & Sons, Hoboken, New Jersey."},{"key":"e_1_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0082"},{"key":"e_1_2_1_113_1","volume-title":"Paper prototyping: The fast and easy way to design and refine user interfaces. Morgan Kaufmann","author":"Snyder Carolyn","unstructured":"Carolyn Snyder. 2003. Paper prototyping: The fast and easy way to design and refine user interfaces. Morgan Kaufmann, San Franciso, CA."},{"key":"e_1_2_1_114_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3299033"},{"key":"e_1_2_1_115_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2204.11836"},{"key":"e_1_2_1_116_1","volume-title":"Design and Evaluation of Security and Privacy Nudges: From Protection Motivation Theory to Implementation Intentions. Ph.,D. Dissertation","author":"Story Peter","unstructured":"Peter Story. 2021. Design and Evaluation of Security and Privacy Nudges: From Protection Motivation Theory to Implementation Intentions. Ph.,D. Dissertation. Carnegie Mellon University."},{"key":"e_1_2_1_117_1","volume-title":"Norman Sadeh, and Florian Schaub.","author":"Story Peter","year":"2022","unstructured":"Peter Story, Daniel Smullen, Rex Chen, Yaxing Yao, Alessandro Acquisti, Lorrie Faith Cranor, Norman Sadeh, and Florian Schaub. 2022. Increasing adoption of tor browser using informational and planning nudges. UMBC Faculty Collection (2022)."},{"key":"e_1_2_1_118_1","doi-asserted-by":"publisher","DOI":"10.1145\/1166253.1166301"},{"key":"e_1_2_1_119_1","doi-asserted-by":"publisher","DOI":"10.1145\/3363384.3363402"},{"key":"e_1_2_1_120_1","doi-asserted-by":"publisher","DOI":"10.1145\/1514095.1514106"},{"key":"e_1_2_1_121_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2022-0082"},{"key":"e_1_2_1_122_1","doi-asserted-by":"publisher","DOI":"10.1145\/1142405.1142410"},{"key":"e_1_2_1_123_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.visres.2006.10.002"},{"key":"e_1_2_1_124_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335362"},{"key":"e_1_2_1_125_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2018.11.003"},{"key":"e_1_2_1_126_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557413"},{"key":"e_1_2_1_127_1","unstructured":"Mark Warner. 2021. Lawmakers Reintroduce Bipartisan Bicameral Legislation to Ban Manipulative 'Dark Patterns'. https:\/\/www.warner.senate.gov\/public\/index.cfm\/2021\/12\/lawmakers-reintroduce-bipartisan-bicameral-legislation-to-ban-manipulative-dark-patterns"},{"key":"e_1_2_1_128_1","volume-title":"Shiqi Jiang, Yunhao Liu, Yaqin Zhang, and Yunxin Liu.","author":"Wen Hao","year":"2023","unstructured":"Hao Wen, Yuanchun Li, Guohong Liu, Shanhui Zhao, Tao Yu, Toby Jia-Jun Li, Shiqi Jiang, Yunhao Liu, Yaqin Zhang, and Yunxin Liu. 2023. Empowering LLM to use Smartphone for Intelligent Task Automation. arxiv: 2308.15272 [cs.AI]"},{"key":"e_1_2_1_129_1","volume-title":"Proceedings of the 19th International Conference on Engineering Design (ICED '13","volume":"020","author":"Wikstr\u00f6m Anders","year":"2013","unstructured":"Anders Wikstr\u00f6m and Roberto Verganti. 2013. Exploring storyboarding in pre-brief activities. In Proceedings of the 19th International Conference on Engineering Design (ICED '13, Vol. 7). Design Society, Seoul, Korea, 011--020. https:\/\/www.designsociety.org\/publication\/34565\/Exploringstoryboardinginpre-briefactivities ISBN: 9781904670506."},{"key":"e_1_2_1_130_1","volume-title":"Dark Patterns and Epistemic Ignorance: An Educational Crisis. In European Conference on the Impact of Artificial Intelligence and Robotics","volume":"4","author":"Richard","unstructured":"Richard Wilson et al. 2022. Dark Patterns and Epistemic Ignorance: An Educational Crisis. In European Conference on the Impact of Artificial Intelligence and Robotics, Vol. 4. Academic Conferences International, Curtis Farm, United Kingdom, 78--84."},{"key":"e_1_2_1_131_1","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2593685"},{"key":"e_1_2_1_132_1","volume-title":"Foundations of Digital Games","author":"Zagal Jos\u00e9 P.","year":"2013","unstructured":"Jos\u00e9 P. Zagal, Staffan Bj\u00f6rk, and Chris Lewis. 2013. Dark patterns in the design of games. In Foundations of Digital Games 2013. Society for the Advancement of the Science of Digital Games, Chania, Greece, 1--8."},{"key":"e_1_2_1_133_1","doi-asserted-by":"publisher","DOI":"10.1145\/3242587.3242632"},{"key":"e_1_2_1_134_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517479"},{"key":"e_1_2_1_135_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v32i1.11618"},{"key":"e_1_2_1_136_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376570"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3637336","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3637336","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T17:17:22Z","timestamp":1755883042000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3637336"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,17]]},"references-count":136,"journal-issue":{"issue":"CSCW1","published-print":{"date-parts":[[2024,4,17]]}},"alternative-id":["10.1145\/3637336"],"URL":"https:\/\/doi.org\/10.1145\/3637336","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4,17]]},"assertion":[{"value":"2024-04-26","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}