{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T00:01:05Z","timestamp":1755993665621,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,6,14]],"date-time":"2024-06-14T00:00:00Z","timestamp":1718323200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006374","name":"Academy of Finland","doi-asserted-by":"publisher","award":["327397"],"award-info":[{"award-number":["327397"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,6,14]]},"DOI":"10.1145\/3674912.3675248","type":"proceedings-article","created":{"date-parts":[[2024,8,8]],"date-time":"2024-08-08T12:57:33Z","timestamp":1723121853000},"page":"43-50","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Third-Party Data Leaks and Dark Patterns in Finnish Political Websites"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-6418-1063","authenticated-orcid":false,"given":"Panu","family":"Puhtila","sequence":"first","affiliation":[{"name":"University of Turku, Finland"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-4798-5261","authenticated-orcid":false,"given":"Timi","family":"Heino","sequence":"additional","affiliation":[{"name":"University of Turku, Finland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1891-2353","authenticated-orcid":false,"given":"Sampsa","family":"Rauti","sequence":"additional","affiliation":[{"name":"University of Turku, Finland"}]}],"member":"320","published-online":{"date-parts":[[2024,8,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v15i1.18038"},{"key":"e_1_3_2_1_2_1","volume-title":"Elections and Voter Surveillance in Western Democracies (June 15","author":"Bennett Colin","year":"2013","unstructured":"Colin Bennett. 2013. The politics of privacy and the privacy of politics: Parties, elections and voter surveillance in Western democracies. Elections and Voter Surveillance in Western Democracies (June 15, 2013) (2013)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1093\/idpl\/ipw021"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103507"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3538969.3539008"},{"key":"e_1_3_2_1_6_1","volume-title":"End-User Perspective. In Designing Interactive Systems Conference","author":"Bongard-Blanchy Kerstin","year":"2021","unstructured":"Kerstin Bongard-Blanchy, Arianna Rossi, Salvador Rivas, Sophie Doublet, Vincent Koenig, and Gabriele Lenzini. 2021. \u201d I am Definitely Manipulated, Even When I am Aware of it. It\u2019s Ridiculous!\u201d-Dark Patterns from the End-User Perspective. In Designing Interactive Systems Conference 2021. 763\u2013776."},{"key":"e_1_3_2_1_7_1","volume-title":"Effects of Dark Patterns in Cookie Notices on End-User Behavior and Perceptions. In Workshop on Usable Security and Privacy (USEC), Vol.\u00a03.","author":"Borberg Ida","year":"2022","unstructured":"Ida Borberg, Rene Hougaard, Willard Rafnsson, and Oksana Kulyk. 2022. So I Sold My Soul\u201d: Effects of Dark Patterns in Cookie Notices on End-User Behavior and Perceptions. In Workshop on Usable Security and Privacy (USEC), Vol.\u00a03."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0038"},{"key":"e_1_3_2_1_9_1","first-page":"105","article-title":"Dark patterns in the media: A systematic review","volume":"7","author":"Cara Corina","year":"2019","unstructured":"Corina Cara 2019. Dark patterns in the media: A systematic review. Network Intelligence Studies 7, 14 (2019), 105\u2013113.","journal-title":"Network Intelligence Studies"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174108"},{"key":"e_1_3_2_1_11_1","volume-title":"Canada, the United Kingdom, and United States in comparative perspective. Howard, Philip N., and Daniel Kreiss","author":"Howard N","year":"2009","unstructured":"Philip\u00a0N Howard and Daniel Kreiss. 2009. Political parties & voter privacy: Australia, Canada, the United Kingdom, and United States in comparative perspective. Howard, Philip N., and Daniel Kreiss (2009)."},{"volume-title":"IFIP International Summer School on Privacy and Identity Management","author":"Kocyigit Emre","key":"e_1_3_2_1_12_1","unstructured":"Emre Kocyigit, Arianna Rossi, and Gabriele Lenzini. 2022. Towards Assessing Features of Dark Patterns in Cookie Consent Processes. In IFIP International Summer School on Privacy and Identity Management. Springer, 165\u2013183."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3481357.3481516"},{"volume-title":"Proceedings of the 11th Indian Conference on Human-Computer Interaction. 24\u201333","author":"Bhoot Aditi","key":"e_1_3_2_1_14_1","unstructured":"Aditi M.\u00a0Bhoot, Mayuri A.\u00a0Shinde, and Wricha P.\u00a0Mishra. 2020. Towards the identification of dark patterns: An analysis based on end-user reactions. In Proceedings of the 11th Indian Conference on Human-Computer Interaction. 24\u201333."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359183"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445610"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3400899.3400901"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1080\/19331681.2024.2316679"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376321"},{"volume-title":"Advances in Communication of Design, Amic\u00a0G. Ho (Ed.)","author":"Richards Timothy","key":"e_1_3_2_1_20_1","unstructured":"Timothy Richards and A.\u00a0Ant Ozok. 2018. Trust Building Privacy Preferences for Young Adults Visiting Political Campaign Websites. In Advances in Communication of Design, Amic\u00a0G. Ho (Ed.). Springer International Publishing, Cham, 52\u201363."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3512223"},{"key":"e_1_3_2_1_22_1","volume-title":"Nordic Conference on Secure IT Systems. Springer, 37\u201353","author":"Vuorinen Esko","year":"2023","unstructured":"Esko Vuorinen, Panu Puhtila, Sampsa Rauti, and Ville Lepp\u00e4nen. 2023. From Whistle to Echo: Data Leaks in Web-Based Whistleblowing Channels. In Nordic Conference on Secure IT Systems. Springer, 37\u201353."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.copsyc.2019.08.025"}],"event":{"name":"CompSysTech '24: International Conference on Computer Systems and Technologies 2024","acronym":"CompSysTech '24","location":"Ruse Bulgaria"},"container-title":["Proceedings of the International Conference on Computer Systems and Technologies 2024"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3674912.3675248","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3674912.3675248","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T23:48:04Z","timestamp":1755906484000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3674912.3675248"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,14]]},"references-count":23,"alternative-id":["10.1145\/3674912.3675248","10.1145\/3674912"],"URL":"https:\/\/doi.org\/10.1145\/3674912.3675248","relation":{},"subject":[],"published":{"date-parts":[[2024,6,14]]},"assertion":[{"value":"2024-08-08","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}