{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T19:59:39Z","timestamp":1776110379035,"version":"3.50.1"},"reference-count":88,"publisher":"Association for Computing Machinery (ACM)","issue":"10","license":[{"start":{"date-parts":[[2024,5,14]],"date-time":"2024-05-14T00:00:00Z","timestamp":1715644800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"crossref","award":["#RGPIN-2022-03353 and #RGPIN-2023-03705"],"award-info":[{"award-number":["#RGPIN-2022-03353 and #RGPIN-2023-03705"]}],"id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Social Sciences and Humanities Research Council of Canada (SSHRC) Insight","award":["#435-2022-0476"],"award-info":[{"award-number":["#435-2022-0476"]}]},{"name":"Canada Foundation for Innovation (CFI) JELF","award":["#41844"],"award-info":[{"award-number":["#41844"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2024,10,31]]},"abstract":"<jats:p>The well-established deceptive design literature has focused on conventional user interfaces. With the rise of extended reality (XR), understanding deceptive design\u2019s unique manifestations in this immersive domain is crucial. However, existing research lacks a full, cross-disciplinary analysis that analyzes how XR technologies enable new forms of deceptive design. Our study reviews the literature on deceptive design in XR environments. We use thematic synthesis to identify key themes. We found that XR\u2019s immersive capabilities and extensive data collection enable subtle and powerful manipulation strategies. We identified eight themes outlining these strategies and discussed existing countermeasures. Our findings show the unique risks of deceptive design in XR, highlighting implications for researchers, designers, and policymakers. We propose future research directions that explore unintentional deceptive design, data-driven manipulation solutions, user education, and the link between ethical design and policy regulations.<\/jats:p>","DOI":"10.1145\/3659945","type":"journal-article","created":{"date-parts":[[2024,4,17]],"date-time":"2024-04-17T12:13:16Z","timestamp":1713355996000},"page":"1-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["Deceived by Immersion: A Systematic Analysis of Deceptive Design in Extended Reality"],"prefix":"10.1145","volume":"56","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5911-1405","authenticated-orcid":false,"given":"Hilda","family":"Hadan","sequence":"first","affiliation":[{"name":"Stratford School of Interaction Design and Business, University of Waterloo, Waterloo, Canada and Games Institute, University of Waterloo, Waterloo, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-1279-9085","authenticated-orcid":false,"given":"Lydia","family":"Choong","sequence":"additional","affiliation":[{"name":"Cheriton School of Computer Science, University of Waterloo, Waterloo, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0756-0022","authenticated-orcid":false,"given":"Leah","family":"Zhang-Kennedy","sequence":"additional","affiliation":[{"name":"Stratford School of Interaction Design and Business, University of Waterloo, Stratford, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4290-8829","authenticated-orcid":false,"given":"Lennart E.","family":"Nacke","sequence":"additional","affiliation":[{"name":"Stratford School of Interaction Design and Business, University of Waterloo, Waterloo, Canada"}]}],"member":"320","published-online":{"date-parts":[[2024,5,14]]},"reference":[{"key":"e_1_3_3_2_2","doi-asserted-by":"crossref","unstructured":"Ademola Adeyoju. 2022. Privacy Dark Patterns: A Case for Regulatory Reform in Canada. Retrieved November 28 2022 from https:\/\/www.cba.org\/Sections\/Privacy-and-Access\/Resources\/Resources\/2022\/EssayWinner2022Privacy","DOI":"10.2139\/ssrn.4226330"},{"key":"e_1_3_3_3_2","unstructured":"Thomas Alsop. 2022. XR: AR VR and the metaverse\u2014Statistics & facts. Statista. Retrieved November 27 2022 from https:\/\/www.statista.com\/topics\/6072\/extended-reality-xr\/"},{"key":"e_1_3_3_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858226"},{"key":"e_1_3_3_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/3461778.3462086"},{"key":"e_1_3_3_6_2","first-page":"1","volume-title":"Proceedings of the CHI Conference on Human Factors in Computing Systems (CHI\u201922)","author":"Bonnail Elise","year":"2022","unstructured":"Elise Bonnail, Wen-Jie Tseng, Eric Lecolinet, Samuel Huron, and Jan Gugenheimer. 2022. Exploring memory manipulation in extended reality using scenario construction. In Proceedings of the CHI Conference on Human Factors in Computing Systems (CHI\u201922). ACM, New York, NY, USA, 1\u20135."},{"key":"e_1_3_3_7_2","unstructured":"Harry Brignull. 2022. Deceptive Design\u2014User Interface Crafted to Trick You. Retrieved November 23 2022 from https:\/\/www.deceptive.design\/"},{"key":"e_1_3_3_8_2","volume-title":"Deceptive Patterns\u2014Exposing the Tricks That Tech Companies Use to Control You","author":"Brignull Harry","year":"2023","unstructured":"Harry Brignull. 2023. Deceptive Patterns\u2014Exposing the Tricks That Tech Companies Use to Control You. Testimonium Ltd., Eastbourne, England."},{"key":"e_1_3_3_9_2","first-page":"1","volume-title":"Proceedings of the 1st Workshop on Novel Challenges of Safety, Security, and Privacy in Extended Reality","author":"Buck Lauren","year":"2022","unstructured":"Lauren Buck and Rachel McDonnell. 2022. Security and privacy in the metaverse: The threat of the digital human. In Proceedings of the 1st Workshop on Novel Challenges of Safety, Security, and Privacy in Extended Reality. ACM, New York, NY, USA, 1\u20134."},{"issue":"2015","key":"e_1_3_3_10_2","first-page":"248","article-title":"Thematic analysis","volume":"222","author":"Clarke Victoria","year":"2015","unstructured":"Victoria Clarke, Virginia Braun, and Nikki Hayfield. 2015. Thematic analysis. Qualitative Psychology: A Practical Guide to Research Methods 222, 2015 (2015), 248.","journal-title":"Qualitative Psychology: A Practical Guide to Research Methods"},{"key":"e_1_3_3_11_2","doi-asserted-by":"publisher","DOI":"10.2307\/1229039"},{"key":"e_1_3_3_12_2","doi-asserted-by":"publisher","DOI":"10.1080\/15213269.2015.1015740"},{"key":"e_1_3_3_13_2","first-page":"1","volume-title":"Proceedings of the 1st Workshop on Novel Challenges of Safety, Security, and Privacy in Extended Reality","author":"Cummings James J.","year":"2022","unstructured":"James J. Cummings and Alexis Shore. 2022. All too real: A typology of user vulnerabilities in extended reality. In Proceedings of the 1st Workshop on Novel Challenges of Safety, Security, and Privacy in Extended Reality. ACM, New York, NY, USA, 1\u20134."},{"key":"e_1_3_3_14_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376600"},{"key":"e_1_3_3_15_2","volume-title":"Balancing User Privacy and Innovation in Augmented and Virtual Reality","author":"Dick Ellysse","year":"2021","unstructured":"Ellysse Dick. 2021. Balancing User Privacy and Innovation in Augmented and Virtual Reality. Technical Report. Information Technology and Innovation Foundation."},{"key":"e_1_3_3_16_2","doi-asserted-by":"crossref","DOI":"10.1201\/9780429274596","volume-title":"The Digital Gaming Handbook","author":"Dillon Roberto","year":"2020","unstructured":"Roberto Dillon. 2020. The Digital Gaming Handbook. CRC Press, Boca Raton, FL."},{"key":"e_1_3_3_17_2","unstructured":"Mozilla MDN Web Docs. 2022. Same-Origin Policy. Retrieved November 28 2022 from https:\/\/developer.mozilla.org\/en-US\/docs\/Web\/Security\/Same-origin_policy"},{"key":"e_1_3_3_18_2","doi-asserted-by":"publisher","DOI":"10.1177\/1329878X211041670"},{"key":"e_1_3_3_19_2","unstructured":"European Parliament Council of the European Union. 2022. Regulation (EU) 2022\/2065 of the European Parliament and of the Council of 19 October 2022 on a Single Market for Digital Services and Amending Directive 2000\/31\/EC (Digital Services Act) (Text with EEA relevance). Retrieved December 7 2023 from https:\/\/eur-lex.europa.eu\/legal-content\/EN\/ALL\/?uri=celex:32022R2065"},{"key":"e_1_3_3_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/3311927.3323136"},{"key":"e_1_3_3_21_2","first-page":"1","volume-title":"Proceedings of the CHI Conference on Human Factors in Computing Systems (CHI\u201922)","author":"Franklin Matija","year":"2022","unstructured":"Matija Franklin. 2022. Virtual spillover of preferences and behavior from extended reality. In Proceedings of the CHI Conference on Human Factors in Computing Systems (CHI\u201922). ACM, New York, NY, USA, 1\u20133."},{"key":"e_1_3_3_22_2","article-title":"Security and privacy in virtual reality\u2014A literature survey","volume":"2205","author":"Giaretta Alberto","year":"2022","unstructured":"Alberto Giaretta. 2022. Security and privacy in virtual reality\u2014A literature survey. arXiv abs\/2205.00208 (2022). https:\/\/api.semanticscholar.org\/CorpusID:248496745","journal-title":"arXiv"},{"key":"e_1_3_3_23_2","doi-asserted-by":"publisher","DOI":"10.1145\/3479516"},{"key":"e_1_3_3_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174108"},{"key":"e_1_3_3_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/3563703.3596635"},{"key":"e_1_3_3_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544549.3585676"},{"key":"e_1_3_3_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445779"},{"key":"e_1_3_3_28_2","doi-asserted-by":"publisher","DOI":"10.1145\/2598510.2598541"},{"key":"e_1_3_3_29_2","unstructured":"The Guardian. 2016. 6x9: A Virtual Experience of Solitary Confinement. Retrieved January 4 2023 from https:\/\/www.theguardian.com\/world\/ng-interactive\/2016\/apr\/27\/6x9-a-virtual-experience-of-solitary-confinement"},{"key":"e_1_3_3_30_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491101.3503741"},{"key":"e_1_3_3_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642104"},{"key":"e_1_3_3_32_2","unstructured":"Ilya Kantor. 2022. The clickjacking attack. JS. Retrieved January 6 2023 from https:\/\/javascript.info\/clickjacking"},{"key":"e_1_3_3_33_2","volume-title":"Trauma Culture: The Politics of Terror and Loss in Media and Literature","author":"Kaplan E. Ann","year":"2005","unstructured":"E. Ann Kaplan. 2005. Trauma Culture: The Politics of Terror and Loss in Media and Literature. Rutgers University Press, New Brunswick, NJ."},{"key":"e_1_3_3_34_2","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/11550.003.0019"},{"key":"e_1_3_3_35_2","doi-asserted-by":"publisher","DOI":"10.1145\/3611053"},{"key":"e_1_3_3_36_2","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1109\/3DUI.2012.6184193","volume-title":"Proceedings of the 2012 IEEE Symposium on 3D User Interfaces (3DUI\u201912)","author":"Kohli Luv","year":"2012","unstructured":"Luv Kohli, Mary C. Whitton, and Frederick P. Brooks. 2012. Redirected touching: The effect of warping space on task performance. In Proceedings of the 2012 IEEE Symposium on 3D User Interfaces (3DUI\u201912). IEEE, 105\u2013112."},{"key":"e_1_3_3_37_2","first-page":"1","volume-title":"Proceedings of the CHI Conference on Human Factors in Computing Systems (CHI\u201922)","author":"Krau\u00df Veronika","year":"2022","unstructured":"Veronika Krau\u00df. 2022. Exploring dark patterns in XR. In Proceedings of the CHI Conference on Human Factors in Computing Systems (CHI\u201922). ACM, New York, NY, USA, 1\u20132."},{"key":"e_1_3_3_38_2","volume-title":"Prosthetic Memory: The Transformation of American Remembrance in the Age of Mass Culture","author":"Landsberg Alison","year":"2004","unstructured":"Alison Landsberg. 2004. Prosthetic Memory: The Transformation of American Remembrance in the Age of Mass Culture. Columbia University Press, New York City, NY."},{"key":"e_1_3_3_39_2","doi-asserted-by":"crossref","first-page":"392","DOI":"10.1109\/SP.2018.00051","volume-title":"Proceedings of the 2018 IEEE Symposium on Security and Privacy (SP\u201918)","author":"Lebeck Kiron","year":"2018","unstructured":"Kiron Lebeck, Kimberly Ruth, Tadayoshi Kohno, and Franziska Roesner. 2018. Towards security and privacy for multi-user augmented reality: Foundations with end users. In Proceedings of the 2018 IEEE Symposium on Security and Privacy (SP\u201918). IEEE, 392\u2013408."},{"key":"e_1_3_3_40_2","first-page":"2543","volume-title":"Proceedings of the 30th USENIX Security Symposium (USENIX Security\u201921)","author":"Lee Hyunjoo","year":"2021","unstructured":"Hyunjoo Lee, Jiyeon Lee, Daejun Kim, Suman Jana, Insik Shin, and Sooel Son. 2021. AdCube: WebVR ad fraud and practical confinement of third-party ads. In Proceedings of the 30th USENIX Security Symposium (USENIX Security\u201921). 2543\u20132560. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/lee-hyunjoo"},{"key":"e_1_3_3_41_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4302-6422-4"},{"key":"e_1_3_3_42_2","first-page":"57","volume-title":"Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI\u201914)","author":"Liu Bin","unstructured":"Bin Liu, Suman Nath, Ramesh Govindan, and Jie Liu. 2014. DECAF: Detecting and characterizing ad fraud in mobile apps. In Proceedings of the 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI\u201914). 57\u201370."},{"key":"e_1_3_3_43_2","doi-asserted-by":"publisher","DOI":"10.1093\/jla\/laaa006"},{"key":"e_1_3_3_44_2","doi-asserted-by":"publisher","DOI":"10.1145\/3429290.3429293"},{"key":"e_1_3_3_45_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445701"},{"key":"e_1_3_3_46_2","unstructured":"Maximilian Maier. 2019. Dark Patterns\u2014An End User Perspective. Master\u2019s Thesis. Umea University."},{"key":"e_1_3_3_47_2","first-page":"271","volume-title":"Proceedings of the 2021 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW\u201921)","author":"Maloney Divine","year":"2021","unstructured":"Divine Maloney, Guo Freeman, and Andrew Robb. 2021. Social virtual reality: Ethical considerations and future directions for an emerging research space. In Proceedings of the 2021 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW\u201921). IEEE, 271\u2013277."},{"key":"e_1_3_3_48_2","doi-asserted-by":"publisher","DOI":"10.1145\/3385956.3418967"},{"key":"e_1_3_3_49_2","doi-asserted-by":"publisher","DOI":"10.1145\/3359183"},{"key":"e_1_3_3_50_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445610"},{"key":"e_1_3_3_51_2","unstructured":"Meta. 2021. Testing In-Headset VR Ads. Meta Quest Blog. Retrieved February 15 2023 from https:\/\/www.meta.com\/blog\/quest\/testing-in-headset-vr-ads\/"},{"key":"e_1_3_3_52_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445253"},{"key":"e_1_3_3_53_2","doi-asserted-by":"publisher","DOI":"10.1145\/3563657.3595964"},{"key":"e_1_3_3_54_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580695"},{"key":"e_1_3_3_55_2","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-020-63734-w"},{"key":"e_1_3_3_56_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580729"},{"key":"e_1_3_3_57_2","first-page":"399","volume-title":"Proceedings of the 13th Symposium on Usable Privacy and Security (SOUPS\u201917)","author":"Naeini Pardis Emami","year":"2017","unstructured":"Pardis Emami Naeini, Sruti Bhagavatula, Hana Habib, Martin Degeling, Lujo Bauer, Lorrie Faith Cranor, and Norman Sadeh. 2017. an IoT world. In Proceedings of the 13th Symposium on Usable Privacy and Security (SOUPS\u201917). 399\u2013412."},{"key":"e_1_3_3_58_2","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2012.116"},{"issue":"1","key":"e_1_3_3_59_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11948-014-9621-1","article-title":"The convergence of virtual reality and social networks: Threats to privacy and autonomy","volume":"22","author":"O\u2019Brolch\u00e1in Fiachra","year":"2016","unstructured":"Fiachra O\u2019Brolch\u00e1in, Tim Jacquemard, David Monaghan, Noel O\u2019Connor, Peter Novitzky, and Bert Gordijn. 2016. The convergence of virtual reality and social networks: Threats to privacy and autonomy. Science and Engineering Ethics 22, 1 (2016), 1\u201329.","journal-title":"Science and Engineering Ethics"},{"key":"e_1_3_3_60_2","unstructured":"Oculus. 2012. Oculus Rift: Step into the Game. Retrieved December 31 2022 from https:\/\/www.kickstarter.com\/projects\/1523379957\/oculus-rift-step-into-the-game"},{"issue":"4","key":"e_1_3_3_61_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3569501","article-title":"Privacy-enhancing technology and everyday augmented reality: Understanding bystanders\u2019 varying needs for awareness and consent","volume":"6","author":"O\u2019Hagan Joseph","year":"2023","unstructured":"Joseph O\u2019Hagan, Pejman Saeghe, Jan Gugenheimer, Daniel Medeiros, Karola Marky, Mohamed Khamis, and Mark McGill. 2023. Privacy-enhancing technology and everyday augmented reality: Understanding bystanders\u2019 varying needs for awareness and consent. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 6, 4 (2023), 1\u201335.","journal-title":"Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"},{"key":"e_1_3_3_62_2","doi-asserted-by":"publisher","DOI":"10.1186\/s13643-021-01626-4"},{"key":"e_1_3_3_63_2","first-page":"1","volume-title":"Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems","author":"Pfeuffer Ken","year":"2019","unstructured":"Ken Pfeuffer, Matthias J. Geiger, Sarah Prange, Lukas Mecke, Daniel Buschek, and Florian Alt. 2019. Behavioural biometrics in VR: Identifying people from body motion and relations in virtual reality. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. ACM, New York, NY, USA, 1\u201312."},{"key":"e_1_3_3_64_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2019.04.077"},{"key":"e_1_3_3_65_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-021-09594-y"},{"key":"e_1_3_3_66_2","first-page":"1","volume-title":"Proceedings of the CHI Conference on Human Factors in Computing Systems","author":"Rogers Katja","year":"2022","unstructured":"Katja Rogers, Sukran Karaosmanoglu, Maximilian Altmeyer, Ally Suarez, and Lennart E. Nacke. 2022. Much realistic, such wow! A systematic literature review of realism in digital games. In Proceedings of the CHI Conference on Human Factors in Computing Systems. ACM, New York, NY, USA, 1\u201321."},{"key":"e_1_3_3_67_2","doi-asserted-by":"publisher","DOI":"10.1080\/17503280.2018.1496055"},{"issue":"5","key":"e_1_3_3_68_2","doi-asserted-by":"crossref","first-page":"827","DOI":"10.1177\/13678779211007863","article-title":"\u2018Forced empathy\u2019: Manipulation, trauma and affect in virtual reality film","volume":"24","author":"Schlembach Raphael","year":"2021","unstructured":"Raphael Schlembach and Nicola Clewer. 2021. \u2018Forced empathy\u2019: Manipulation, trauma and affect in virtual reality film. International Journal of Cultural Studies 24, 5 (2021), 827\u2013843.","journal-title":"International Journal of Cultural Studies"},{"issue":"3","key":"e_1_3_3_69_2","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1007\/s12130-010-9127-3","article-title":"Competence and trust in choice architecture","volume":"23","author":"Selinger Evan","year":"2010","unstructured":"Evan Selinger and Kyle Powys Whyte. 2010. Competence and trust in choice architecture. Knowledge, Technology & Policy 23, 3 (2010), 461\u2013482.","journal-title":"Knowledge, Technology & Policy"},{"key":"e_1_3_3_70_2","doi-asserted-by":"publisher","DOI":"10.1177\/009365091018005007"},{"key":"e_1_3_3_71_2","doi-asserted-by":"publisher","DOI":"10.1145\/3419249.3420132"},{"key":"e_1_3_3_72_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300767"},{"key":"e_1_3_3_73_2","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068843"},{"key":"e_1_3_3_74_2","first-page":"1","volume-title":"Proceedings of the 1st Workshop on Novel Challenges of Safety, Security, and Privacy in Extended Reality","author":"Su Zihao","year":"2022","unstructured":"Zihao Su, Faysal Hossain Shezan, Yuan Tian, David Evans, and Seongkook Heo. 2022. Perception hacking for 2D cursorjacking in virtual reality. In Proceedings of the 1st Workshop on Novel Challenges of Safety, Security, and Privacy in Extended Reality. ACM, New York, NY, USA, 1\u20135."},{"issue":"8","key":"e_1_3_3_75_2","doi-asserted-by":"crossref","first-page":"103556","DOI":"10.1016\/j.im.2021.103556","article-title":"Calculus interdependency, personality contingency, and causal asymmetry: Toward a configurational privacy calculus model of information disclosure","volume":"58","author":"Sun Yongqiang","year":"2021","unstructured":"Yongqiang Sun, Nan Wang, and Xiao-Liang Shen. 2021. Calculus interdependency, personality contingency, and causal asymmetry: Toward a configurational privacy calculus model of information disclosure. Information & Management 58, 8 (2021), 103556.","journal-title":"Information & Management"},{"key":"e_1_3_3_76_2","first-page":"1","article-title":"Online manipulation: Hidden influences in a digital world","volume":"4","author":"Susser Daniel","year":"2019","unstructured":"Daniel Susser, Beate Roessler, and Helen Nissenbaum. 2019. Online manipulation: Hidden influences in a digital world. Georgetown Law Technology Review 4 (2019), 1.","journal-title":"Georgetown Law Technology Review"},{"key":"e_1_3_3_77_2","volume-title":"Choice Architecture","author":"Thaler Richard H.","year":"2013","unstructured":"Richard H. Thaler, Cass R. Sunstein, and John P. Balz. 2013. Choice Architecture. Vol. 2013. Princeton University Press, Princeton, NJ."},{"key":"e_1_3_3_78_2","unstructured":"The Consumer Council of Norway (Forbrukerr\u00e5det). 2018. Deceived by design\u2014How tech companies use dark patterns to discourage us from exercising our rights to privacy. ConPolicy. Retrieved January 4 2023 from https:\/\/www.conpolicy.de\/en\/news-detail\/deceived-by-design-how-tech-companies-use-dark-patterns-to-discourage-us-from-exercising-our-right"},{"key":"e_1_3_3_79_2","unstructured":"The United States Department of Justice Archives. 2016. Report and Recommendations Concerning the Use of Restrictive Housing. Retrieved January 4 2023 from https:\/\/www.justice.gov\/archives\/dag\/report-and-recommendations-concerning-use-restrictive-housing"},{"key":"e_1_3_3_80_2","doi-asserted-by":"publisher","DOI":"10.1145\/2381876.2381879"},{"key":"e_1_3_3_81_2","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2288-8-45"},{"key":"e_1_3_3_82_2","first-page":"218","volume-title":"Proceedings of the International Conference on Human-Computer Interaction","author":"Torstensson Niklas","year":"2020","unstructured":"Niklas Torstensson, Tarja Susi, Ulf Wilhelmsson, and Mikael Lebram. 2020. Wizard of Oz and the design of a multi-player mixed reality game. In Proceedings of the International Conference on Human-Computer Interaction. 218\u2013232."},{"key":"e_1_3_3_83_2","first-page":"3789","volume-title":"Proceedings of the 31st USENIX Security Symposium (USENIX Security\u201922)","author":"Trimananda Rahmadi","year":"2022","unstructured":"Rahmadi Trimananda, Hieu Le, Hao Cui, Janice Tran Ho, Anastasia Shuba, and Athina Markopoulou. 2022. OVRseen: Auditing network traffic and privacy policies in Oculus VR. In Proceedings of the 31st USENIX Security Symposium (USENIX Security\u201922). 3789\u20133806. https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/trimananda"},{"key":"e_1_3_3_84_2","doi-asserted-by":"publisher","DOI":"10.1108\/03090560710737534"},{"key":"e_1_3_3_85_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.05.040"},{"key":"e_1_3_3_86_2","article-title":"The potential power of data: Hyper-personalization for each and every client","author":"Williams Shane","year":"2022","unstructured":"Shane Williams. 2022. The potential power of data: Hyper-personalization for each and every client. Forbes Technology Council. Retrieved January 6, 2023 from https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2022\/06\/22\/the-potential-power-of-data-hyper-personalization-for-each-and-every-client\/?sh=3d162b4c5545","journal-title":"Forbes Technology Council"},{"key":"e_1_3_3_87_2","volume-title":"The XRSI Definitions of Extended Reality (XR)","author":"(XRSI) XR Safety Initiative","year":"2020","unstructured":"XR Safety Initiative (XRSI). 2020. The XRSI Definitions of Extended Reality (XR). XRSI Standard Publication XR-001. XR Safety Initiative (XRSI)."},{"key":"e_1_3_3_88_2","volume-title":"Virtual Worlds, Real Risks and Challenges\u20141st XR Data Classification Roundtable Report","author":"(XRSI) XR Safety Initiative","year":"2021","unstructured":"XR Safety Initiative (XRSI). 2021. Virtual Worlds, Real Risks and Challenges\u20141st XR Data Classification Roundtable Report. Technical Report. XR Safety Initiative (XRSI)."},{"key":"e_1_3_3_89_2","first-page":"1","volume-title":"Foundations of Digital Games 2013","author":"Zagal Jos\u00e9 P.","year":"2013","unstructured":"Jos\u00e9 P. Zagal, Staffan Bj\u00f6rk, and Chris Lewis. 2013. Dark patterns in the design of games. In Foundations of Digital Games 2013. ACM, New York, NY, USA, 1\u20138."}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3659945","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3659945","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:58:30Z","timestamp":1750294710000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3659945"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,14]]},"references-count":88,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2024,10,31]]}},"alternative-id":["10.1145\/3659945"],"URL":"https:\/\/doi.org\/10.1145\/3659945","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5,14]]},"assertion":[{"value":"2023-03-03","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-04-15","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-05-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}