{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T18:52:47Z","timestamp":1776106367773,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":88,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T00:00:00Z","timestamp":1745539200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["IIS-170275"],"award-info":[{"award-number":["IIS-170275"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100009157","name":"National Institute on Disability, Independent Living, and Rehabilitation Research","doi-asserted-by":"publisher","award":["90ARCP000"],"award-info":[{"award-number":["90ARCP000"]}],"id":[{"id":"10.13039\/100009157","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,4,26]]},"DOI":"10.1145\/3706598.3713784","type":"proceedings-article","created":{"date-parts":[[2025,4,28]],"date-time":"2025-04-28T14:48:11Z","timestamp":1745851691000},"page":"1-18","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Inaccessible and Deceptive: Examining Experiences of Deceptive Design with People Who Use Visual Accessibility Technology"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4858-5496","authenticated-orcid":false,"given":"Aaleyah","family":"Lewis","sequence":"first","affiliation":[{"name":"University of Washington, Seattle, Washington, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2008-4136","authenticated-orcid":false,"given":"Jesse J","family":"Martinez","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, Washington, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8640-0544","authenticated-orcid":false,"given":"Maitraye","family":"Das","sequence":"additional","affiliation":[{"name":"Northeastern University, Boston, Massachusetts, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9194-934X","authenticated-orcid":false,"given":"James","family":"Fogarty","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, Washington, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,4,25]]},"reference":[{"key":"e_1_3_3_3_2_2","unstructured":"Aira: A Visual Interpreting Service. https:\/\/aira.io\/"},{"key":"e_1_3_3_3_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/3320435.3320460"},{"key":"e_1_3_3_3_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/3025171.3025229"},{"key":"e_1_3_3_3_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/3234695.3236348"},{"key":"e_1_3_3_3_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/1296843.1296854"},{"key":"e_1_3_3_3_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/3132525.3132533"},{"key":"e_1_3_3_3_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/3132525.3132531"},{"key":"e_1_3_3_3_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025731"},{"key":"e_1_3_3_3_10_2","doi-asserted-by":"publisher","DOI":"10.1145\/3461778.3462086"},{"key":"e_1_3_3_3_11_2","doi-asserted-by":"publisher","DOI":"10.1145\/1805986.1806005"},{"key":"e_1_3_3_3_12_2","doi-asserted-by":"crossref","unstructured":"Christoph B\u00f6sch Benjamin Erb Frank Kargl Henning Kopp and Stefan Pfattheicher. 2016. Tales from the Dark Side: Privacy Dark Strategies and Privacy Dark Patterns. Proc. Priv. Enhancing Technol. 2016 4 (2016) 237\u2013254.","DOI":"10.1515\/popets-2016-0038"},{"key":"e_1_3_3_3_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/2700648.2809864"},{"key":"e_1_3_3_3_14_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-5251-4_103"},{"key":"e_1_3_3_3_15_2","unstructured":"Harry Brignull. Deceptive Patterns - User Interfaces Crafted to Trick You. https:\/\/www.deceptive.design\/"},{"key":"e_1_3_3_3_16_2","doi-asserted-by":"publisher","unstructured":"Andy Brown Caroline Jay and Simon Harper. 2012. Tailored Presentation of Dynamic Web Content for Audio Browsers. International Journal of Human-Computer Studies 70 3 (2012) 179 \u2013 196. 10.1016\/j.ijhcs.2011.11.001","DOI":"10.1016\/j.ijhcs.2011.11.001"},{"key":"e_1_3_3_3_17_2","unstructured":"California Consumer Privacy Act Regulations. https:\/\/cppa.ca.gov\/regulations\/pdf\/cppa_regs.pdf"},{"key":"e_1_3_3_3_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/3033701.3033718"},{"key":"e_1_3_3_3_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581258"},{"key":"e_1_3_3_3_20_2","doi-asserted-by":"publisher","unstructured":"James\u00a0M. Clarke Maryam Mehrnezhad and Ehsan Toreini. 2024. Invisible Unreadable and Inaudible Cookie Notices: An Evaluation of Cookie Notices for Users with Visual Impairments. ACM Trans. Access. Comput. 17 1 Article 1 (mar 2024) 39\u00a0pages. 10.1145\/3641281","DOI":"10.1145\/3641281"},{"key":"e_1_3_3_3_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772719"},{"key":"e_1_3_3_3_22_2","unstructured":"Norwegian\u00a0Consumer Council. 2018. Deceived by Design. Norwegian Consumer Council Report (2018)."},{"key":"e_1_3_3_3_23_2","volume-title":"Non-Visual Access to the Digital Library (NoVA): The Use of the Digital Library Interfaces by Blind and Visually Impaired People","author":"Craven Jenny","year":"2003","unstructured":"Jenny Craven and Peter Brophy. 2003. Non-Visual Access to the Digital Library (NoVA): The Use of the Digital Library Interfaces by Blind and Visually Impaired People. Citeseer."},{"key":"e_1_3_3_3_24_2","doi-asserted-by":"crossref","unstructured":"Maitraye Das Darren Gergle and Anne\u00a0Marie Piper. 2019. \"It doesn\u2019t win you friends\" Understanding Accessibility in Collaborative Writing for People with Vision Impairments. Proceedings of the ACM on Human-Computer Interaction 3 CSCW (2019) 1\u201326.","DOI":"10.1145\/3359293"},{"key":"e_1_3_3_3_25_2","volume-title":"DiGRA\u201920-Abstract Proceedings of the 2020 DiGRA International Conference","author":"Deterding Christoph\u00a0Sebastian","year":"2020","unstructured":"Christoph\u00a0Sebastian Deterding, Jaakko Stenros, and Markus Montola. 2020. Against \"Dark Game Design Patterns\". In DiGRA\u201920-Abstract Proceedings of the 2020 DiGRA International Conference. York."},{"key":"e_1_3_3_3_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376600"},{"key":"e_1_3_3_3_27_2","unstructured":"Digital Services Act - Regulation (EU) 2022\/2065. https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=celex%3A32022R2065"},{"key":"e_1_3_3_3_28_2","doi-asserted-by":"publisher","unstructured":"B.\u00a0J. Fogg. 2002. Persuasive Technology: Using Computers to Change What We Think and Do. Ubiquity 2002 December Article 5 (dec 2002) 32\u00a0pages. 10.1145\/764008.763957","DOI":"10.1145\/764008.763957"},{"key":"e_1_3_3_3_29_2","first-page":"93","volume-title":"Open Identity Summit (OID), 5-6 october 2017, Karlstad, Sweden.","author":"Fritsch Lothar","year":"2017","unstructured":"Lothar Fritsch. 2017. Privacy Dark Patterns in Identity Management. In Open Identity Summit (OID), 5-6 october 2017, Karlstad, Sweden. Gesellschaft f\u00fcr Informatik, 93\u2013104."},{"key":"e_1_3_3_3_30_2","doi-asserted-by":"publisher","DOI":"10.1145\/2661334.2661363"},{"key":"e_1_3_3_3_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/3524010.3539498"},{"key":"e_1_3_3_3_32_2","doi-asserted-by":"crossref","unstructured":"Nuzhah Gooda\u00a0Sahib Anastasios Tombros and Tony Stockman. 2014. Investigating the Behavior of Visually Impaired Users for Multi-session Search Tasks. Journal of the Association for Information Science and Technology 65 1 (2014) 69\u201383.","DOI":"10.1002\/asi.22955"},{"key":"e_1_3_3_3_33_2","doi-asserted-by":"crossref","unstructured":"PAJ Gra\u00dfl HK Schraffenberger FJ Zuiderveen\u00a0Borgesius and MA Buijzen. 2021. Dark and Bright Patterns in Cookie Consent Requests. (2021).","DOI":"10.31234\/osf.io\/gqs5h"},{"key":"e_1_3_3_3_34_2","doi-asserted-by":"publisher","unstructured":"Colin\u00a0M. Gray Jingle Chen Shruthi\u00a0Sai Chivukula and Liyang Qu. 2021. End User Accounts of Dark Patterns as Felt Manipulation. Proc. ACM Hum.-Comput. Interact. 5 CSCW2 Article 372 (Oct. 2021) 25\u00a0pages. 10.1145\/3479516","DOI":"10.1145\/3479516"},{"key":"e_1_3_3_3_35_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300408"},{"key":"e_1_3_3_3_36_2","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174108"},{"key":"e_1_3_3_3_37_2","doi-asserted-by":"crossref","unstructured":"Colin\u00a0M Gray Cristiana Santos and Nataliia Bielova. 2023. Towards a Preliminary Ontology of Dark Patterns Knowledge. (2023).","DOI":"10.1145\/3544549.3585676"},{"key":"e_1_3_3_3_38_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445779"},{"key":"e_1_3_3_3_39_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642436"},{"key":"e_1_3_3_3_40_2","doi-asserted-by":"publisher","DOI":"10.1145\/2598510.2598541"},{"key":"e_1_3_3_3_41_2","doi-asserted-by":"publisher","unstructured":"William Grussenmeyer and Eelke Folmer. 2017. Accessible Touchscreen Technology for People with Visual Impairments: A Survey. ACM Trans. Access. Comput. 9 2 Article 6 (jan 2017) 31\u00a0pages. 10.1145\/3022701","DOI":"10.1145\/3022701"},{"key":"e_1_3_3_3_42_2","doi-asserted-by":"crossref","unstructured":"Stephanie Hackett Bambang Parmanto and Xiaoming Zeng. 2005. A Retrospective Look at Website Accessibility over Time. Behaviour & Information Technology 24 6 (2005) 407\u2013417.","DOI":"10.1080\/01449290500066661"},{"key":"e_1_3_3_3_43_2","doi-asserted-by":"crossref","unstructured":"Vicki\u00a0L Hanson and John\u00a0T Richards. 2013. Progress on Website Accessibility? ACM Transactions on the Web (TWEB) 7 1 (2013) 1\u201330.","DOI":"10.1145\/2435215.2435217"},{"key":"e_1_3_3_3_44_2","doi-asserted-by":"publisher","DOI":"10.1145\/3597638.3608389"},{"key":"e_1_3_3_3_45_2","unstructured":"Scott Hollier Janina Sajka Jason White and Michael Cooper. Inaccessibility of CAPTCHA. https:\/\/www.w3.org\/TR\/2018\/WD-turingtest-20180703\/"},{"key":"e_1_3_3_3_46_2","doi-asserted-by":"crossref","unstructured":"Jo\u00e3o Janeiro S\u00e9rgio Alves Tiago Guerreiro Florian Alt and Verena Distler. 2024. Understanding Phishing Experiences of Screen Reader Users. IEEE Security & Privacy (2024).","DOI":"10.1109\/MSEC.2024.3430110"},{"key":"e_1_3_3_3_47_2","doi-asserted-by":"crossref","unstructured":"H\u00a0Stephen Kaye Patricia Yeager and Myisha Reed. 2008. Disparities in Usage of Assistive Technology Among People With Disabilities. Assistive Technology 20 4 (2008) 194\u2013203.","DOI":"10.1080\/10400435.2008.10131946"},{"key":"e_1_3_3_3_48_2","doi-asserted-by":"crossref","unstructured":"Satwik\u00a0Ram Kodandaram Mohan Sunkara Sampath Jayarathna and Vikas Ashok. 2023. Detecting Deceptive Dark-Pattern Web Advertisements for Blind Screen-Reader Users. Journal of Imaging 9 11 (2023) 239.","DOI":"10.3390\/jimaging9110239"},{"key":"e_1_3_3_3_49_2","doi-asserted-by":"crossref","unstructured":"Jonathan Lazar Aaron Allen Jason Kleinman and Chris Malarkey. 2007. What Frustrates Screen Reader Users on the Web: A Study of 100 Blind Users. International Journal of human-computer interaction 22 3 (2007) 247\u2013269.","DOI":"10.1080\/10447310709336964"},{"key":"e_1_3_3_3_50_2","doi-asserted-by":"publisher","DOI":"10.1145\/1168987.1169013"},{"key":"e_1_3_3_3_51_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445467"},{"key":"e_1_3_3_3_52_2","doi-asserted-by":"publisher","unstructured":"Darren Lunn Simon Harper and Sean Bechhofer. 2011. Identifying Behavioral Strategies of Visually Impaired Users to Improve Access to Web Content. ACM Trans. Access. Comput. 3 4 Article 13 (apr 2011) 35\u00a0pages. 10.1145\/1952388.1952390","DOI":"10.1145\/1952388.1952390"},{"key":"e_1_3_3_3_53_2","doi-asserted-by":"publisher","DOI":"10.1145\/3429290.3429293"},{"key":"e_1_3_3_3_54_2","doi-asserted-by":"publisher","DOI":"10.1145\/3517428.3544803"},{"key":"e_1_3_3_3_55_2","doi-asserted-by":"crossref","unstructured":"Maximilian Maier and Rikard Harr. 2020. Dark Design Patterns: An End-User Perspective. Human Technology 16 2 (Aug. 2020) 170\u2013199. https:\/\/ht.csr-pub.eu\/index.php\/ht\/article\/view\/6","DOI":"10.17011\/ht\/urn.202008245641"},{"key":"e_1_3_3_3_56_2","doi-asserted-by":"publisher","DOI":"10.1145\/1878803.1878807"},{"key":"e_1_3_3_3_57_2","doi-asserted-by":"crossref","unstructured":"Delvani\u00a0Ant\u00f4nio Mateus Carlos\u00a0Alberto Silva Arthur\u00a0FBA de Oliveira Heitor Costa and Andr\u00e9\u00a0Pimenta Freire. 2021. A Systematic Mapping of Accessibility Problems Encountered on Websites and Mobile Apps: A Comparison Between Automated Tests Manual Inspections and User Evaluations. Journal on Interactive Systems 12 1 (2021) 145\u2013171.","DOI":"10.5753\/jis.2021.1778"},{"key":"e_1_3_3_3_58_2","doi-asserted-by":"publisher","unstructured":"Arunesh Mathur Gunes Acar Michael\u00a0J. Friedman Eli Lucherini Jonathan Mayer Marshini Chetty and Arvind Narayanan. 2019. Dark Patterns at Scale: Findings from a Crawl of 11K Shopping Websites. Proc. ACM Hum.-Comput. Interact. 3 CSCW Article 81 (nov 2019) 32\u00a0pages. 10.1145\/3359183","DOI":"10.1145\/3359183"},{"key":"e_1_3_3_3_59_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445610"},{"key":"e_1_3_3_3_60_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642542"},{"key":"e_1_3_3_3_61_2","doi-asserted-by":"publisher","DOI":"10.1145\/3563657.3595964"},{"key":"e_1_3_3_3_62_2","first-page":"166","volume-title":"International technology and persons with disabilities conference scientific\/research proceedings (CSUN 2014)","author":"Milne Lauren\u00a0R","year":"2014","unstructured":"Lauren\u00a0R Milne, Cynthia\u00a0L Bennett, and Richard\u00a0E Ladner. 2014. The Accessibility of Mobile Health Sensors for Blind Users. In International technology and persons with disabilities conference scientific\/research proceedings (CSUN 2014). 166\u2013175."},{"key":"e_1_3_3_3_63_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491101.3519829"},{"key":"e_1_3_3_3_64_2","doi-asserted-by":"crossref","unstructured":"Emma Murphy Ravi Kuber Graham McAllister Philip Strain and Wai Yu. 2008. An Empirical Investigation into the Difficulties Experienced by Visually Impaired Internet Users. Universal Access in the Information Society 7 (2008) 79\u201391.","DOI":"10.1007\/s10209-007-0098-4"},{"key":"e_1_3_3_3_65_2","doi-asserted-by":"publisher","unstructured":"Brad Myers. 1994. Challenges of HCI Design and Implementation. Interactions 1 1 (jan 1994) 73\u201383. 10.1145\/174800.174808","DOI":"10.1145\/174800.174808"},{"key":"e_1_3_3_3_66_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376321"},{"key":"e_1_3_3_3_67_2","doi-asserted-by":"publisher","DOI":"10.1145\/3242587.3242649"},{"key":"e_1_3_3_3_68_2","doi-asserted-by":"publisher","DOI":"10.1145\/3549015.3554213"},{"key":"e_1_3_3_3_69_2","doi-asserted-by":"crossref","unstructured":"Eyal Peer Serge Egelman Marian Harbach Nathan Malkin Arunesh Mathur and Alisa Frik. 2020. Nudge Me Right: Personalizing Online Security Nudges to People\u2019s Decision-making Styles. Computers in Human Behavior 109 (2020) 106347.","DOI":"10.1016\/j.chb.2020.106347"},{"key":"e_1_3_3_3_70_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3502056"},{"key":"e_1_3_3_3_71_2","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207736"},{"key":"e_1_3_3_3_72_2","doi-asserted-by":"crossref","unstructured":"Jacquie Ripat and Roberta Woodgate. 2011. The Intersection of Culture Disability and Assistive Technology. Disability and Rehabilitation: Assistive Technology 6 2 (2011) 87\u201396.","DOI":"10.3109\/17483107.2010.507859"},{"key":"e_1_3_3_3_73_2","doi-asserted-by":"crossref","unstructured":"Andr\u00e9 Rodrigues Hugo Nicolau Kyle Montague Jo\u00e3o Guerreiro and Tiago Guerreiro. 2020. Open Challenges of Blind People Using Smartphones. International Journal of Human\u2013Computer Interaction 36 17 (2020) 1605\u20131622.","DOI":"10.1080\/10447318.2020.1768672"},{"key":"e_1_3_3_3_74_2","doi-asserted-by":"publisher","DOI":"10.1145\/3132525.3132547"},{"key":"e_1_3_3_3_75_2","doi-asserted-by":"crossref","unstructured":"Rose\u00a0M Rubin and Shelley\u00a0I White-Means. 2001. Race Disability and Assistive Devices: Sociodemographics or Discrimination. International Journal of Social Economics 28 10\/11\/12 (2001) 927\u2013941.","DOI":"10.1108\/EUM0000000006133"},{"key":"e_1_3_3_3_76_2","doi-asserted-by":"publisher","DOI":"10.1145\/3563657.3596013"},{"key":"e_1_3_3_3_77_2","doi-asserted-by":"crossref","unstructured":"Leandro\u00a0Coelho Serra Lucas\u00a0Pedroso Carvalho Lucas\u00a0Pereira Ferreira Jorge Belimar\u00a0Silva Vaz and Andr\u00e9\u00a0Pimenta Freire. 2015. Accessibility Evaluation of E-Government Mobile Applications in Brazil. Procedia Computer Science 67 (2015) 348\u2013357.","DOI":"10.1016\/j.procs.2015.09.279"},{"key":"e_1_3_3_3_78_2","doi-asserted-by":"publisher","DOI":"10.1145\/3419249.3420132"},{"key":"e_1_3_3_3_79_2","doi-asserted-by":"crossref","unstructured":"Susan\u00a0Leigh Star and Anselm Strauss. 1999. Layers of Silence Arenas of Voice: The Ecology of Visible and Invisible Work. Computer supported cooperative work 8 1-2 (1999) 9\u201330.","DOI":"10.1023\/A:1008651105359"},{"key":"e_1_3_3_3_80_2","doi-asserted-by":"crossref","unstructured":"Daniel Susser Beate Roessler and Helen Nissenbaum. 2019. Technology Autonomy and Manipulation. Internet Policy Review 8 2 (2019).","DOI":"10.14763\/2019.2.1410"},{"key":"e_1_3_3_3_81_2","volume-title":"Nudge: Improving Decisions About Health, Wealth, and Happiness","author":"Thaler Richard\u00a0H","year":"2009","unstructured":"Richard\u00a0H Thaler and Cass\u00a0R Sunstein. 2009. Nudge: Improving Decisions About Health, Wealth, and Happiness. Penguin."},{"key":"e_1_3_3_3_82_2","unstructured":"The WebAIM Million. https:\/\/webaim.org\/projects\/million\/"},{"key":"e_1_3_3_3_83_2","doi-asserted-by":"publisher","DOI":"10.1145\/2481492.2481499"},{"key":"e_1_3_3_3_84_2","doi-asserted-by":"publisher","unstructured":"Markel Vigo and Simon Harper. 2013. Coping Tactics Employed by Visually Disabled Users on the Web. International Journal of Human-Computer Studies 71 11 (November 2013) 1013\u20131025. 10.1016\/j.ijhcs.2013.08.002","DOI":"10.1016\/j.ijhcs.2013.08.002"},{"key":"e_1_3_3_3_85_2","unstructured":"W3C: Introduction to Web Accessibility. https:\/\/www.w3.org\/WAI\/fundamentals\/accessibility-intro\/"},{"key":"e_1_3_3_3_86_2","unstructured":"Web Content Accessibility Guidelines (WCAG). https:\/\/www.w3.org\/WAI\/WCAG21\/quickref\/"},{"key":"e_1_3_3_3_87_2","unstructured":"WebAIM: Introduction to Web Accessibility. https:\/\/webaim.org\/intro\/"},{"key":"e_1_3_3_3_88_2","doi-asserted-by":"crossref","unstructured":"Markus Weinmann Christoph Schneider and Jan\u00a0vom Brocke. 2016. Digital Nudging. Business & Information Systems Engineering 58 (2016) 433\u2013436.","DOI":"10.1007\/s12599-016-0453-1"},{"key":"e_1_3_3_3_89_2","volume-title":"Foundations of Digital Games 2013","author":"Zagal Jos\u00e9\u00a0P","year":"2013","unstructured":"Jos\u00e9\u00a0P Zagal, Staffan Bj\u00f6rk, and Chris Lewis. 2013. Dark Patterns in the Design of Games. In Foundations of Digital Games 2013."}],"event":{"name":"CHI 2025: CHI Conference on Human Factors in Computing Systems","location":"Yokohama Japan","acronym":"CHI '25","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2025 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706598.3713784","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3706598.3713784","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3706598.3713784","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T05:38:43Z","timestamp":1751607523000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706598.3713784"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,25]]},"references-count":88,"alternative-id":["10.1145\/3706598.3713784","10.1145\/3706598"],"URL":"https:\/\/doi.org\/10.1145\/3706598.3713784","relation":{},"subject":[],"published":{"date-parts":[[2025,4,25]]},"assertion":[{"value":"2025-04-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}