{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T16:26:25Z","timestamp":1764433585862,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100002347","name":"Bundesministerium f\u00fcr Bildung und Forschung","doi-asserted-by":"publisher","award":["16KIS1631"],"award-info":[{"award-number":["16KIS1631"]}],"id":[{"id":"10.13039\/501100002347","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002347","name":"Bundesministerium f\u00fcr Bildung und Forschung","doi-asserted-by":"publisher","award":["16KIS1629"],"award-info":[{"award-number":["16KIS1629"]}],"id":[{"id":"10.13039\/501100002347","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.1145\/3701571.3701588","type":"proceedings-article","created":{"date-parts":[[2024,12,3]],"date-time":"2024-12-03T07:28:21Z","timestamp":1733210901000},"page":"133-147","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Trickery: Exploring a Serious Game Approach to Raise Awareness of Deceptive Patterns"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0460-3787","authenticated-orcid":false,"given":"Kirill","family":"Kronhardt","sequence":"first","affiliation":[{"name":"TU Dortmund University, Dortmund, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-9630-5964","authenticated-orcid":false,"given":"Kevin","family":"Rolfes","sequence":"additional","affiliation":[{"name":"Westphalian University of Applied Sciences, Gelsenkirchen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0634-3931","authenticated-orcid":false,"given":"Jens","family":"Gerken","sequence":"additional","affiliation":[{"name":"TU Dortmund University, Dortmund, Germany"}]}],"member":"320","published-online":{"date-parts":[[2024,12,2]]},"reference":[{"key":"e_1_3_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491101.3519837"},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"publisher","unstructured":"Alessandro Acquisti Laura Brandimarte and George Loewenstein. 2015. Privacy and human behavior in the age of information. Science 347 6221 (2015) 509\u2013514. 10.1126\/science.aaa1465","DOI":"10.1126\/science.aaa1465"},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"publisher","unstructured":"A. Acquisti and J. Grossklags. 2005. Privacy and rationality in individual decision making. IEEE Security & Privacy 3 1 (2005) 26\u201333. 10.1109\/MSP.2005.22 https:\/\/dl.acm.org\/doi\/10.1109\/MSP.2005.22","DOI":"10.1109\/MSP.2005.22"},{"key":"e_1_3_3_2_5_2","unstructured":"Opeyemi\u00a0Priscilla Akinyemi. 2022. \"Dark Cookie\" - A Serious Game to Train Users to Spot and Interact with Dark Patterns in Cookie Banners. Master\u2019s thesis. University of Luxembourg Belval Luxembourg."},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.4324\/9780203416655"},{"key":"e_1_3_3_2_7_2","unstructured":"Julian Alvarez Damien Djaouti et\u00a0al. 2011. An introduction to Serious game Definitions and concepts. Serious games & simulation for risks management 11 1 (2011) 11\u201315."},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"publisher","unstructured":"Daniel Anderson and Richard von Seck. 2020. The GDPR and Its Impact on the Web. Seminar IITM SS 20 Network Architectures and Services N\/A N\/A (November 2020) 1\u20135. 10.2313\/NET-2020-11-1_01","DOI":"10.2313\/NET-2020-11-1_01"},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"crossref","unstructured":"Katrin Becker. 2021. What\u2019s the difference between gamification serious games educational games and game-based learning. Academia Letters 209 (2021) 1\u20134.","DOI":"10.20935\/AL209"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-33759-9_23"},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1145\/3461778.3462086"},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"publisher","unstructured":"Christoph B\u00f6sch Benjamin Erb Frank Kargl Henning Kopp and Stefan Pfattheicher. 2016. Tales from the Dark Side: Privacy Dark Strategies and Privacy Dark Patterns. Proceedings on Privacy Enhancing Technologies 2016 4 (2016) 237\u2013254. 10.1515\/popets-2016-0038","DOI":"10.1515\/popets-2016-0038"},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"publisher","unstructured":"Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative Research in Psychology 3 2 (2006) 77\u2013101. 10.1191\/1478088706qp063oa","DOI":"10.1191\/1478088706qp063oa"},{"key":"e_1_3_3_2_14_2","unstructured":"H. Brignull and M. Leiser. 13.09.2023. Deceptive Patterns - Home. https:\/\/www.deceptive.design\/"},{"key":"e_1_3_3_2_15_2","first-page":"21","volume-title":"Proceedings of the Poster Presentation, Australian Psychological Society Congress","author":"Brignull Harry","year":"2015","unstructured":"Harry Brignull, Marc Miquel, Jeremy Rosenberg, and James Offer. 2015. Dark patterns: User interfaces designed to trick people. In Proceedings of the Poster Presentation, Australian Psychological Society Congress. Australian Psychological Society, Sydney, NSW, Australia, 21\u201323."},{"key":"e_1_3_3_2_16_2","first-page":"1","volume-title":"Joint Proceedings of the ACM IUI 2019 Workshops","author":"Chromik Michael","year":"2019","unstructured":"Michael Chromik, Malin Eiband, Sarah\u00a0Theres V\u00f6lkel, and Daniel Buschek. 2019. Dark Patterns of Explainability, Transparency, and User Control for Intelligent Systems. In Joint Proceedings of the ACM IUI 2019 Workshops. ACM, Association for Computing Machinery, Los Angeles, USA, 1\u20136."},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772719"},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376600"},{"key":"e_1_3_3_2_19_2","unstructured":"Mary Dondlinger. 2007. Educational Video Game Design: A Review of the Literature. Journal of Applied Educational Technology 4 (01 2007)."},{"key":"e_1_3_3_2_20_2","first-page":"483","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Farke Florian\u00a0M.","year":"2021","unstructured":"Florian\u00a0M. Farke, David\u00a0G. Balash, Maximilian Golla, Markus D\u00fcrmuth, and Adam\u00a0J. Aviv. 2021. Are Privacy Dashboards Good for End Users? Evaluating User Perceptions and Reactions to Google\u2019s My Activity. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, Virtual, 483\u2013500. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/farke"},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-05544-7_21"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642436"},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174108"},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63464-3_41"},{"key":"e_1_3_3_2_25_2","doi-asserted-by":"publisher","unstructured":"M.\u00a0P.\u00a0Jacob Habgood and Shaaron\u00a0E. Ainsworth. 2011. Motivating Children to Learn Effectively: Exploring the Value of Intrinsic Integration in Educational Games. Journal of the Learning Sciences 20 2 (April 2011) 169\u2013206. 10.1080\/10508406.2010.508029","DOI":"10.1080\/10508406.2010.508029"},{"key":"e_1_3_3_2_26_2","doi-asserted-by":"publisher","unstructured":"Stephen Hart Andrea Margheri Federica Paci and Vladimiro Sassone. 2020. Riskio: A Serious Game for Cyber Security Awareness and Education. Computers & Security 95 (2020) 101827. 10.1016\/j.cose.2020.101827","DOI":"10.1016\/j.cose.2020.101827"},{"key":"e_1_3_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-55415-5_38"},{"key":"e_1_3_3_2_28_2","volume-title":"Thinking, Fast and Slow","author":"Kahneman Daniel","year":"2011","unstructured":"Daniel Kahneman. 2011. Thinking, Fast and Slow. Farrar, Straus and Giroux, [S.I.]."},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"publisher","unstructured":"Nuri Kara. 2021. A Systematic Review of the Use of Serious Games in Science Education. Contemporary Educational Technology 13 2 (Jan. 2021) ep295. 10.30935\/cedtech\/9608","DOI":"10.30935\/cedtech\/9608"},{"key":"e_1_3_3_2_30_2","unstructured":"Hanna Krasnova Natasha\u00a0F Veltri and Oliver G\u00fcnther. 2012. Self-disclosure and privacy calculus on social networking sites: The role of culture: Intercultural dynamics of privacy calculus. Wirtschaftsinformatik 54 (2012) 123\u2013133."},{"key":"e_1_3_3_2_31_2","series-title":"(CEUR-WS)","volume-title":"Workshop on Mobilizing Research and Regulatory Action on Dark Patterns and Deceptive Design Practices. A CHI 2024 Workshop, CHI Conference on Human Factors in Computing Systems","author":"Kronhardt Kirill","year":"2024","unstructured":"Kirill Kronhardt and Jens Gerken. 2024. Start Playing Around - Serious & Persuasive Games as a Viable Counter-Measure Against Deceptive Patterns?. In Workshop on Mobilizing Research and Regulatory Action on Dark Patterns and Deceptive Design Practices. A CHI 2024 Workshop, CHI Conference on Human Factors in Computing Systems(CEUR-WS). CEUR Workshop Proceedings, Honolulu, HI, USA (Hybrid Workshop), 9\u00a0pages. https:\/\/ceur-ws.org\/ Available under Creative Commons License Attribution 4.0 International (CC BY 4.0)."},{"key":"e_1_3_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4302-6422-4"},{"key":"e_1_3_3_2_33_2","volume-title":"Story-Telling and Narrative: A Neurophilosophical Perspective","author":"Liston Delores\u00a0D.","year":"1994","unstructured":"Delores\u00a0D. Liston. 1994. Story-Telling and Narrative: A Neurophilosophical Perspective. Technical Report. University of North Carolina. https:\/\/eric.ed.gov\/?id=ED372092."},{"key":"e_1_3_3_2_34_2","doi-asserted-by":"publisher","unstructured":"Yuwen Lu Chao Zhang Yuewen Yang Yaxing Yao and Toby Jia-Jun Li. 2024. From Awareness to Action: Exploring End-User Empowerment Interventions for Dark Patterns in UX. Proc. ACM Hum.-Comput. Interact. 8 CSCW1 (April 2024) 59:1\u201359:41. 10.1145\/3637336https:\/\/dl.acm.org\/doi\/10.1145\/3637336","DOI":"10.1145\/3637336"},{"key":"e_1_3_3_2_35_2","doi-asserted-by":"publisher","unstructured":"Jamie Luguri and Lior\u00a0Jacob Strahilevitz. 2021. Shining a Light on Dark Patterns. Journal of Legal Analysis 13 1 (03 2021) 43\u2013109. 10.1093\/jla\/laaa006","DOI":"10.1093\/jla\/laaa006"},{"key":"e_1_3_3_2_36_2","doi-asserted-by":"crossref","unstructured":"Maximilian Maier and Rikard Harr. 2020. Dark Design Patterns: An End-User Perspective. Human Technology 16 2 (Aug. 2020) 170\u2013199.","DOI":"10.17011\/ht\/urn.202008245641"},{"key":"e_1_3_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1145\/3575879.3576002"},{"key":"e_1_3_3_2_38_2","doi-asserted-by":"publisher","unstructured":"Arunesh Mathur Gunes Acar Michael\u00a0J. Friedman Eli Lucherini Jonathan Mayer Marshini Chetty and Arvind Narayanan. 2019. Dark Patterns at Scale: Findings from a Crawl of 11K Shopping Websites. Proc. ACM Hum.-Comput. Interact. 3 CSCW Article 81 (nov 2019) 32\u00a0pages. 10.1145\/3359183https:\/\/dl.acm.org\/doi\/10.1145\/3359183","DOI":"10.1145\/3359183"},{"key":"e_1_3_3_2_39_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445610"},{"key":"e_1_3_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642542"},{"key":"e_1_3_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.1145\/3563657.3595964"},{"key":"e_1_3_3_2_42_2","doi-asserted-by":"publisher","unstructured":"Emily Naul and Min Liu. 2020. Why Story Matters: A Review of Narrative in Serious Games. Journal of Educational Computing Research 58 3 (2020) 687\u2013707. 10.1177\/0735633119859904","DOI":"10.1177\/0735633119859904"},{"key":"e_1_3_3_2_43_2","doi-asserted-by":"publisher","unstructured":"Chinenye Ndulue and Rita Orji. 2023. Games for Change\u2014A Comparative Systematic Review of Persuasive Strategies in Games for Behavior Change. IEEE Transactions on Games 15 2 (2023) 121\u2013133. 10.1109\/TG.2022.3159090","DOI":"10.1109\/TG.2022.3159090"},{"key":"e_1_3_3_2_44_2","unstructured":"Karen\u00a0Maria Nyvoll. 2020. Serious Interactive Board Games: Increasing Awareness of Dark Patterns in Teenagers. Master\u2019s thesis. NTNU."},{"key":"e_1_3_3_2_45_2","doi-asserted-by":"publisher","DOI":"10.1145\/3549015.3554213"},{"key":"e_1_3_3_2_46_2","doi-asserted-by":"publisher","unstructured":"Steven Reiss. 2004. Multifaceted Nature of Intrinsic Motivation: The Theory of 16 Basic Desires. Review of General Psychology 8 3 (2004) 179\u2013193. 10.1037\/1089-2680.8.3.179","DOI":"10.1037\/1089-2680.8.3.179"},{"key":"e_1_3_3_2_47_2","doi-asserted-by":"publisher","unstructured":"Ronald\u00a0W. Rogers. 1975. A Protection Motivation Theory of Fear Appeals and Attitude Change1. The Journal of Psychology 91 1 (1975) 93\u2013114. 10.1080\/00223980.1975.9915803PMID: 28136248.","DOI":"10.1080\/00223980.1975.9915803"},{"key":"e_1_3_3_2_48_2","doi-asserted-by":"publisher","unstructured":"Johanna Sch\u00e4wel. 2019. How to Raise Users\u2019 Awareness of Online Privacy: An Empirical and Theoretical Approach for Examining the Impact of Persuasive Privacy Support Measures on Users\u2019 Self-Disclosure on Online Social Networking Sites. Ph.\u00a0D. Dissertation. DuEPublico: Duisburg-Essen Publications online University of Duisburg-Essen Germany. 10.17185\/DUEPUBLICO\/70691","DOI":"10.17185\/DUEPUBLICO\/70691"},{"key":"e_1_3_3_2_49_2","doi-asserted-by":"publisher","unstructured":"Johannes Schiebener and Matthias Brand. 2015. Decision Making Under Objective Risk Conditions\u2013a Review of Cognitive and Emotional Correlates Strategies Feedback Processing and External Influences. Neuropsychology Review 25 2 (April 2015) 171\u2013198. 10.1007\/s11065-015-9285-x","DOI":"10.1007\/s11065-015-9285-x"},{"key":"e_1_3_3_2_50_2","doi-asserted-by":"publisher","unstructured":"Carla Sousa and Ana Oliveira. 2023. The Dark Side of Fun: Understanding Dark Patterns and Literacy Needs in Early Childhood Mobile Gaming. European Conference on Games Based Learning 17 1 (Sept. 2023) 599\u2013610. 10.34190\/ecgbl.17.1.1656","DOI":"10.34190\/ecgbl.17.1.1656"},{"key":"e_1_3_3_2_51_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-48855-9_25"},{"key":"e_1_3_3_2_52_2","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354212"},{"key":"e_1_3_3_2_53_2","doi-asserted-by":"crossref","unstructured":"Evert Van\u00a0den Broeck Karolien Poels and Michel Walrave. 2015. Older and wiser? Facebook use privacy concern and privacy protection in the life stages of emerging young and middle adulthood. Social Media+ Society 1 2 (2015) 2056305115616149.","DOI":"10.1177\/2056305115616149"},{"key":"e_1_3_3_2_54_2","doi-asserted-by":"publisher","DOI":"10.5220\/0006301000800091"},{"key":"e_1_3_3_2_55_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77750-0_10"},{"key":"e_1_3_3_2_56_2","doi-asserted-by":"crossref","unstructured":"Bo Xiao and Izak Benbasat. 2011. Product-Related Deception in E-Commerce: A Theoretical Perspective. MIS Quarterly 35 1 (2011) 169\u2013195. http:\/\/www.jstor.org\/stable\/23043494","DOI":"10.2307\/23043494"},{"key":"e_1_3_3_2_57_2","volume-title":"Foundations of Digital Games 2013","author":"Zagal Jos\u00e9\u00a0P","year":"2013","unstructured":"Jos\u00e9\u00a0P Zagal, Staffan Bj\u00f6rk, and Chris Lewis. 2013. Dark Patterns in the Design of Games. In Foundations of Digital Games 2013. Society for the Advancement of the Science of Digital Games, Chania, Crete, Greece, 8\u00a0pages."},{"key":"e_1_3_3_2_58_2","doi-asserted-by":"crossref","unstructured":"Yu Zhonggen et\u00a0al. 2019. A meta-analysis of use of serious games in education over a decade. International Journal of Computer Games Technology 2019 (2019) 8\u00a0pages.","DOI":"10.1155\/2019\/4797032"}],"event":{"name":"MUM '24: International Conference on Mobile and Ubiquitous Multimedia","acronym":"MUM '24","location":"Stockholm Sweden"},"container-title":["Proceedings of the International Conference on Mobile and Ubiquitous Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3701571.3701588","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3701571.3701588","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:00Z","timestamp":1750295880000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3701571.3701588"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":57,"alternative-id":["10.1145\/3701571.3701588","10.1145\/3701571"],"URL":"https:\/\/doi.org\/10.1145\/3701571.3701588","relation":{},"subject":[],"published":{"date-parts":[[2024,12]]},"assertion":[{"value":"2024-12-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}