{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T12:21:31Z","timestamp":1773318091356,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,28]],"date-time":"2024-10-28T00:00:00Z","timestamp":1730073600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"The Hong Kong Polytechnic University's Start-up Fund for New Recruits","award":["P0046056"],"award-info":[{"award-number":["P0046056"]}]},{"name":"Guangzhou Municipal Nansha District Science and Technology Bureau","award":["2022ZD012"],"award-info":[{"award-number":["2022ZD012"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,28]]},"DOI":"10.1145\/3664647.3681679","type":"proceedings-article","created":{"date-parts":[[2024,10,26]],"date-time":"2024-10-26T06:59:41Z","timestamp":1729925981000},"page":"68-77","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Towards Trustworthy MetaShopping: Studying Manipulative Audiovisual Designs in Virtual-Physical Commercial Platforms"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9451-4840","authenticated-orcid":false,"given":"Esm\u00e9e Henrieke Anne","family":"de Haas","sequence":"first","affiliation":[{"name":"The Hong Kong Polytechnic University, Hong Kong, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9754-8608","authenticated-orcid":false,"given":"Lik-Hang","family":"Lee","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnic University, Hong Kong, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1361-1612","authenticated-orcid":false,"given":"Yiming","family":"Huang","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong, Hong Kong, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9827-5528","authenticated-orcid":false,"given":"Carlos","family":"Bermejo","sequence":"additional","affiliation":[{"name":"Hong Kong University of Science and Technology, Hong Kong, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6026-1083","authenticated-orcid":false,"given":"Pan","family":"Hui","sequence":"additional","affiliation":[{"name":"Hong Kong University of Science and Technology (Guangzhou), Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3518-691X","authenticated-orcid":false,"given":"Zijun","family":"Lin","sequence":"additional","affiliation":[{"name":"London School of Economics and Political Science, London, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2024,10,28]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300589"},{"key":"e_1_3_2_2_2_1","unstructured":"Adobe. 2023. Download adobe aero and get started. https:\/\/helpx.adobe.com\/aero\/get-started.html"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2009.5069395"},{"key":"e_1_3_2_2_4_1","unstructured":"anonymous. 2023. Enlarged Figures. Retrieved May 4 2023 from https:\/\/drive.google.com\/drive\/folders\/1I-TqtrwRJzqS4qWFoEkUYqpsb6ur4uq?usp=share_link"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/1466603.1466606"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3474085.3475552"},{"key":"e_1_3_2_2_7_1","volume-title":"https:\/\/www.deceptive.design. [Online","author":"Brignull Harry","year":"2021","unstructured":"Harry Brignull. 2019. Dark Patterns. https:\/\/www.deceptive.design. [Online; accessed 10-August-2021]."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICISE.2009.1342"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772719"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3233774"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376600"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3474085.3479238"},{"key":"e_1_3_2_2_13_1","volume-title":"International conference on security and privacy in communication systems. Springer, 149--166","author":"Eshete Birhanu","year":"2012","unstructured":"Birhanu Eshete, Adolfo Villafiorita, and KomministWeldemariam. 2012. Binspect: Holistic analysis and detection of malicious web pages. In International conference on security and privacy in communication systems. Springer, 149--166."},{"key":"e_1_3_2_2_14_1","volume-title":"ACM International Conference on Multimodal Interaction. Association for Computing Machinery (ACM).","author":"Fernandez Carlos Bermejo","year":"2021","unstructured":"Carlos Bermejo Fernandez, Lik-Hang Lee, Petteri Nurmi, and Pan Hui. 2021. PARA: Privacy Management and Control in Emerging IoT Ecosystems using Augmented Reality. In ACM International Conference on Multimodal Interaction. Association for Computing Machinery (ACM)."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3334480.3382923"},{"key":"e_1_3_2_2_16_1","volume-title":"Maya GeorgievaMaya Georgieva is an EdTech, and XR strategist","author":"Georgieva Maya","year":"2018","unstructured":"Maya Georgieva, Maya GeorgievaMaya Georgieva is an EdTech, and XR strategist. 2018. New Yorker Magazine gets creative with augmented reality cover. https:\/\/www.digitalbodies.net\/augmented-reality\/new-yorker-magazinegets-creative-with-augmented-reality-cover\/"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174108"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2598510.2598541"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359626"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3474085.3475678"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3463527"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.5325\/intelitestud.19.1"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISMAR.2018.00032"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3501848"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2018.2794073"},{"key":"e_1_3_2_2_26_1","volume-title":"Proceedings of the 2016 International Conference on Industrial Engineering and Operations Management Kuala Lumpur","volume":"8","author":"Kidane Teklehaimanot Tadele","year":"2016","unstructured":"Teklehaimanot Tadele Kidane and RRK Sharma. 2016. Factors Affecting Consumers' purchasing Decision through ECommerce. In Proceedings of the 2016 International Conference on Industrial Engineering and Operations Management Kuala Lumpur, Malaysia, Vol. 8. 159--165."},{"key":"e_1_3_2_2_27_1","first-page":"19","article-title":"Suspicious malicious web site detection with strength analysis of a javascript obfuscation","volume":"26","author":"Kim Byung-Ik","year":"2011","unstructured":"Byung-Ik Kim, Chae-Tae Im, and Hyun-Chul Jung. 2011. Suspicious malicious web site detection with strength analysis of a javascript obfuscation. International Journal of Advanced Science and Technology 26 (2011), 19--32.","journal-title":"International Journal of Advanced Science and Technology"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274371"},{"key":"e_1_3_2_2_29_1","unstructured":"Richard Lawler. 2021. Nike just bought a virtual shoe company that makes nfts and sneakers 'for the metaverse'. https:\/\/www.theverge.com\/22833369\/nikertfkt-nft-sneaker-shoe-metaverse-company"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.13"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.13"},{"key":"e_1_3_2_2_32_1","volume-title":"Virtual Ecosystem, and Research Agenda. ArXiv abs\/2110.05352","author":"Lee Lik-Hang","year":"2021","unstructured":"Lik-Hang Lee, Tristan Braud, Pengyuan Zhou, Lin Wang, Dianlei Xu, Zijun Lin, Abhishek Kumar, Carlos Bermejo, and Pan Hui. 2021. All One Needs to Know about Metaverse: A Complete Survey on Technological Singularity, Virtual Ecosystem, and Research Agenda. ArXiv abs\/2110.05352 (2021)."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3281505.3281560"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445777"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174020"},{"key":"e_1_3_2_2_36_1","volume-title":"Research design explained: Instructor's edition","author":"J.","unstructured":"J. M. M. L., & Jolley. 2010. Research design explained: Instructor's edition (7th ed.). Wadsworth\/Cengage Learning.","edition":"7"},{"key":"e_1_3_2_2_37_1","volume-title":"International Journal of Human--Computer Interaction","author":"Maccario Guglielmo","year":"2022","unstructured":"Guglielmo Maccario and Maurizio Naldi. 2022. Alexa, Is My Data Safe? The (Ir) relevance of Privacy in Smart Speakers Reviews. International Journal of Human--Computer Interaction (2022), 1--13."},{"key":"e_1_3_2_2_38_1","unstructured":"Supplementary Material. 2022. What is Real or Not? - Supplement Experimental Demo. https:\/\/www.youtube.com\/watch?v=iJDT36A71K8"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359183"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445610"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-021-00424-w"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445253"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1177\/002224298204600313"},{"key":"e_1_3_2_2_44_1","volume-title":"Haptic Fidelity Framework: Defining the Factors of Realistic Haptic Feedback for Virtual Reality. In CHI Conference on Human Factors in Computing Systems. 1--17","author":"Muender Thomas","year":"2022","unstructured":"Thomas Muender, Michael Bonfert, Anke Verena Reinschluessel, Rainer Malaka, and Tanja D\u00f6ring. 2022. Haptic Fidelity Framework: Defining the Factors of Realistic Haptic Feedback for Virtual Reality. In CHI Conference on Human Factors in Computing Systems. 1--17."},{"key":"e_1_3_2_2_45_1","volume-title":"Likert scales, levels of measurement and the 'laws' of statistics. Advances in health sciences education 15, 5","author":"Norman Geoff","year":"2010","unstructured":"Geoff Norman. 2010. Likert scales, levels of measurement and the 'laws' of statistics. Advances in health sciences education 15, 5 (2010), 625--632."},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10055-006-0059-x"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2617917"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2984751.2985729"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2580723.2580730"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3501960"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517492"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2006.11.006"},{"key":"e_1_3_2_2_53_1","volume-title":"Intelligent autonomous agents and trust in virtual reality. Computers in Human Behavior Reports","author":"Sun Ningyuan","year":"2021","unstructured":"Ningyuan Sun and Jean Botev. 2021. Intelligent autonomous agents and trust in virtual reality. Computers in Human Behavior Reports (2021)."},{"key":"e_1_3_2_2_54_1","volume-title":"Cognitive biases, dark patterns, and the 'privacy paradox'. Current opinion in psychology 31","author":"Waldman Ari Ezra","year":"2020","unstructured":"Ari Ezra Waldman. 2020. Cognitive biases, dark patterns, and the 'privacy paradox'. Current opinion in psychology 31 (2020), 105--109."},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274446"},{"key":"e_1_3_2_2_56_1","volume-title":"Foundations of Digital Games","author":"Zagal Jos\u00e9 P","year":"2013","unstructured":"Jos\u00e9 P Zagal, Staffan Bj\u00f6rk, and Chris Lewis. 2013. Dark patterns in the design of games. In Foundations of Digital Games 2013."}],"event":{"name":"MM '24: The 32nd ACM International Conference on Multimedia","location":"Melbourne VIC Australia","acronym":"MM '24","sponsor":["SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["Proceedings of the 32nd ACM International Conference on Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664647.3681679","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3664647.3681679","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:17:50Z","timestamp":1750295870000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664647.3681679"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,28]]},"references-count":56,"alternative-id":["10.1145\/3664647.3681679","10.1145\/3664647"],"URL":"https:\/\/doi.org\/10.1145\/3664647.3681679","relation":{},"subject":[],"published":{"date-parts":[[2024,10,28]]},"assertion":[{"value":"2024-10-28","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}