{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T23:53:00Z","timestamp":1776124380756,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","funder":[{"name":"ANR","award":["22-PECY-0002 IPoP (Interdisciplinary Project on Privacy)"],"award-info":[{"award-number":["22-PECY-0002 IPoP (Interdisciplinary Project on Privacy)"]}]},{"name":"Inria","award":["DATA4US Exploratory Action"],"award-info":[{"award-number":["DATA4US Exploratory Action"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,7,5]]},"DOI":"10.1145\/3715668.3736336","type":"proceedings-article","created":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T08:10:41Z","timestamp":1751703041000},"page":"501-507","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Towards Key Contributing Factors in Identifying Dark Pattern Autonomy Violations under the EU Digital Services Act"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5178-5077","authenticated-orcid":false,"given":"Sanju","family":"Ahuja","sequence":"first","affiliation":[{"name":"Inria Centre at Universit\u00e9 C\u00f4te d'Azur, Valbonne, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5813-9019","authenticated-orcid":false,"given":"Johanna","family":"Gunawan","sequence":"additional","affiliation":[{"name":"Law and Tech Lab, Maastricht University, Maastricht, Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-0616-8394","authenticated-orcid":false,"given":"Nataliia","family":"Bielova","sequence":"additional","affiliation":[{"name":"Inria Centre at Universit\u00e9 C\u00f4te d'Azur, Valbonne, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0712-2038","authenticated-orcid":false,"given":"Cristiana Teixeira","family":"Santos","sequence":"additional","affiliation":[{"name":"School of Law, Utrecht University, Utrecht, Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2025,7,5]]},"reference":[{"key":"e_1_3_3_3_2_2","doi-asserted-by":"publisher","unstructured":"Sanju Ahuja and Jyoti Kumar. 2022. Conceptualizations of user autonomy within the normative evaluation of dark patterns. Ethics and Information Technology 24 Article 52 (2022). 10.1007\/s10676-022-09672-9","DOI":"10.1007\/s10676-022-09672-9"},{"key":"e_1_3_3_3_3_2","volume-title":"Proceedings of the Mobilizing Research and Regulatory Action on Dark Patterns and Deceptive Design Practices (DDPCHI 2024) Workshop at CHI conference on Human Factors in Computing Systems","author":"Ahuja Sanju","year":"2024","unstructured":"Sanju Ahuja and Jyoti Kumar. 2024. Layered Analysis of Persuasive Designs: A Framework for Identification and Autonomy Evaluation of Dark Patterns. In Proceedings of the Mobilizing Research and Regulatory Action on Dark Patterns and Deceptive Design Practices (DDPCHI 2024) Workshop at CHI conference on Human Factors in Computing Systems (Honolulu, HI, USA). Article 1, 14\u00a0pages. https:\/\/ceur-ws.org\/Vol-3720\/paper1.pdf"},{"key":"e_1_3_3_3_4_2","series-title":"(SEC \u201924)","volume-title":"Proceedings of the 33rd USENIX Conference on Security Symposium","author":"Bielova Nataliia","year":"2024","unstructured":"Nataliia Bielova, Laura Litvine, Anysia Nguyen, Mariam Chammat, Vincent Toubiana, and Estelle Hary. 2024. The effect of design patterns on (present and future) cookie consent decisions. In Proceedings of the 33rd USENIX Conference on Security Symposium (Philadelphia, PA, USA) (SEC \u201924). USENIX Association, USA, Article 158, 18\u00a0pages."},{"key":"e_1_3_3_3_5_2","doi-asserted-by":"publisher","unstructured":"Christoph B\u00f6sch Benjamin Erb Frank Kargl Henning Kopp and Stefan Pfattheicher. 2016. Tales from the dark side: Privacy dark strategies and privacy dark patterns. Proceedings on Privacy Enhancing Technologies 2016 4 (2016) 237\u2013254. 10.1515\/popets-2016-0038","DOI":"10.1515\/popets-2016-0038"},{"key":"e_1_3_3_3_6_2","unstructured":"Harry Brignull. 2018. Deceptive Patterns: User Interfaces Designed to Trick People. http:\/\/darkpatterns.org\/"},{"key":"e_1_3_3_3_7_2","unstructured":"Harry Brignull. 2023. Deceptive Patterns. https:\/\/www.deceptive.design"},{"key":"e_1_3_3_3_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/3532106.3533562"},{"key":"e_1_3_3_3_9_2","volume-title":"Evidence review of Online Choice Architecture and consumer and competition harm","year":"2022","unstructured":"CMA 2022. Evidence review of Online Choice Architecture and consumer and competition harm. Technical Report. https:\/\/www.gov.uk\/government\/publications\/online-choice-architecture-how-digital-design-can-harm-competition-and-consumers\/evidence-review-of-online-choice-architecture-and-consumer-and-competition-harm"},{"key":"e_1_3_3_3_10_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376600"},{"key":"e_1_3_3_3_11_2","unstructured":"DSA 2022. Regulation (EU) 2022\/2065 of the European Parliament and of the Council of 19 October 2022 on a Single Market For Digital Services and amending Directive 2000\/31\/EC (Digital Services Act) (Text with EEA relevance). http:\/\/data.europa.eu\/eli\/reg\/2022\/2065\/oj"},{"key":"e_1_3_3_3_12_2","unstructured":"European Commission 2024. Commission opens formal proceedings against Facebook and Instagram under the Digital Services Act. https:\/\/ec.europa.eu\/commission\/presscorner\/detail\/en\/ip_24_2373"},{"key":"e_1_3_3_3_13_2","unstructured":"European Commission 2024. Commission sends preliminary findings to X for breach of the Digital Services Act. https:\/\/ec.europa.eu\/commission\/presscorner\/detail\/en\/ip_24_3761"},{"key":"e_1_3_3_3_14_2","volume-title":"Guidelines 3\/2022 on Dark patterns in social media platform interfaces: How to recognise and avoid them","author":"Board European Data Protection","year":"2023","unstructured":"European Data Protection Board. 2023. Guidelines 3\/2022 on Dark patterns in social media platform interfaces: How to recognise and avoid them. Technical Report Version 2.0. https:\/\/edpb.europa.eu\/system\/files\/2023-02\/edpb_03-2022_guidelines_on_deceptive_design_patterns_in_social_media_platform_interfaces_v2_en_0.pdf"},{"key":"e_1_3_3_3_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/3311927.3323136"},{"key":"e_1_3_3_3_16_2","volume-title":"Bringing Dark Patterns to Light Staff Report","year":"2022","unstructured":"FTC 2022. Bringing Dark Patterns to Light Staff Report. Technical Report. Federal Trade Commission. https:\/\/www.ftc.gov\/system\/files\/ftc_gov\/pdf\/P214800%20Dark%20Patterns%20Report%209.14.2022%20-%20FINAL.pdf"},{"key":"e_1_3_3_3_17_2","doi-asserted-by":"publisher","unstructured":"Maximilian Gartner. 2022. Regulatory Acknowledgment of Individual Autonomy in European Digital Legislation: From Meta-Principle to Explicit Protection in the Data Act. European Data Protection Law Review 8 4 (2022). 10.21552\/edpl\/2022\/4\/6","DOI":"10.21552\/edpl\/2022\/4\/6"},{"key":"e_1_3_3_3_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613905.3636310"},{"key":"e_1_3_3_3_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174108"},{"key":"e_1_3_3_3_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/3706598.3713828"},{"key":"e_1_3_3_3_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445779"},{"key":"e_1_3_3_3_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642436"},{"key":"e_1_3_3_3_23_2","doi-asserted-by":"publisher","unstructured":"Johanna Gunawan Amogh Pradeep David Choffnes Woodrow Hartzog and Christo Wilson. 2021. A Comparative Study of Dark Patterns Across Web and Mobile Modalities. Proc. ACM Hum.-Comput. Interact. 5 CSCW2 Article 377 (Oct. 2021) 29\u00a0pages. 10.1145\/3479521","DOI":"10.1145\/3479521"},{"key":"e_1_3_3_3_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/3511265.3550448"},{"key":"e_1_3_3_3_25_2","doi-asserted-by":"publisher","unstructured":"Jamie Luguri and Lior\u00a0Jacob Strahilevitz. 2021. Shining a Light on Dark Patterns. Journal of Legal Analysis 13 1 (March 2021) 43\u2013109. 10.1093\/jla\/laaa006","DOI":"10.1093\/jla\/laaa006"},{"key":"e_1_3_3_3_26_2","doi-asserted-by":"publisher","DOI":"10.2838\/859030"},{"key":"e_1_3_3_3_27_2","volume-title":"The Stanford Encyclopedia of Philosophy (Winter 2016 ed.)","author":"Mahon James\u00a0Edwin","year":"2016","unstructured":"James\u00a0Edwin Mahon. 2016. The Definition of Lying and Deception. In The Stanford Encyclopedia of Philosophy (Winter 2016 ed.), Edward\u00a0N. Zalta (Ed.). Metaphysics Research Lab, Stanford University."},{"key":"e_1_3_3_3_28_2","doi-asserted-by":"publisher","unstructured":"Gianclaudio Malgieri and Cristiana Santos. 2025. Assessing the (severity of) impacts on fundamental rights. Computer Law & Security Review 56 (2025) 106113. 10.1016\/j.clsr.2025.106113","DOI":"10.1016\/j.clsr.2025.106113"},{"key":"e_1_3_3_3_29_2","doi-asserted-by":"publisher","unstructured":"Arunesh Mathur Gunes Acar Michael\u00a0J. Friedman Eli Lucherini Jonathan Mayer Marshini Chetty and Arvind Narayanan. 2019. Dark Patterns at Scale: Findings from a Crawl of 11K Shopping Websites. Proc. ACM Hum.-Comput. Interact. 3 CSCW Article 81 (Nov. 2019) 32\u00a0pages. 10.1145\/3359183","DOI":"10.1145\/3359183"},{"key":"e_1_3_3_3_30_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445610"},{"key":"e_1_3_3_3_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/3563657.3595964"},{"key":"e_1_3_3_3_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580695"},{"key":"e_1_3_3_3_33_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300472"},{"key":"e_1_3_3_3_34_2","volume-title":"The Stanford Encyclopedia of Philosophy (Summer 2022 ed.)","author":"Noggle Robert","year":"2022","unstructured":"Robert Noggle. 2022. The Ethics of Manipulation. In The Stanford Encyclopedia of Philosophy (Summer 2022 ed.), Edward\u00a0N. Zalta (Ed.). Metaphysics Research Lab, Stanford University."},{"key":"e_1_3_3_3_35_2","doi-asserted-by":"publisher","DOI":"10.1787\/44f5e846-en"},{"key":"e_1_3_3_3_36_2","doi-asserted-by":"crossref","unstructured":"Cristiana Santos Nataliia Bielova Sanju Ahuja Christine Utz Colin Gray and Gilles Mertens. 2024. Which Online Platforms and Dark Patterns Should Be Regulated under Article 25 of the DSA?Available at SSRN: https:\/\/ssrn.com\/abstract=4899559.","DOI":"10.2139\/ssrn.4899559"},{"key":"e_1_3_3_3_37_2","doi-asserted-by":"publisher","unstructured":"Cristiana Santos Viktorija Morozovaite and Silvia De\u00a0Conca. 2025. No harm no foul: how harms caused by dark patterns are conceptualised and tackled under EU data protection consumer and competition laws. Information & Communications Technology Law (2025) 1\u201347. 10.1080\/13600834.2025.2461958","DOI":"10.1080\/13600834.2025.2461958"},{"key":"e_1_3_3_3_38_2","doi-asserted-by":"publisher","unstructured":"Brennan Schaffner Neha\u00a0A. Lingareddy and Marshini Chetty. 2022. Understanding Account Deletion and Relevant Dark Patterns on Social Media. Proc. ACM Hum.-Comput. Interact. 6 CSCW2 Article 417 (Nov. 2022) 43\u00a0pages. 10.1145\/3555142","DOI":"10.1145\/3555142"},{"key":"e_1_3_3_3_39_2","volume-title":"2025 ACM Conference On Computer-Supported Cooperative Work And Social Computing (CSCW 2025)","author":"Schaffner Brennan","year":"2025","unstructured":"Brennan Schaffner, Yaretzi Ulloa, Riya Sahni, Jiatong Li, Ava\u00a0Kim Cohen, Natasha Messier, Lan Gao, and Marshini Chetty. 2025. An Experimental Study Of Netflix Use and the Effects of Autoplay on Watching Behaviors. In 2025 ACM Conference On Computer-Supported Cooperative Work And Social Computing (CSCW 2025). Accepted for publication."},{"key":"e_1_3_3_3_40_2","doi-asserted-by":"publisher","unstructured":"Daniel Susser Beate Roessler and Helen Nissenbaum. 2019. Technology autonomy and manipulation. Internet Policy Review 8 (2019). Issue 2. 10.14763\/2019.2.1410","DOI":"10.14763\/2019.2.1410"},{"key":"e_1_3_3_3_41_2","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199338207.001.0001"},{"key":"e_1_3_3_3_42_2","volume-title":"Foundations of Digital Games 2013","author":"Zagal Jos\u00e9\u00a0P","year":"2013","unstructured":"Jos\u00e9\u00a0P Zagal, Staffan Bj\u00f6rk, and Chris Lewis. 2013. Dark patterns in the design of games. In Foundations of Digital Games 2013. https:\/\/www.diva-portal.org\/smash\/get\/diva2:1043332\/FULLTEXT01.pdf"}],"event":{"name":"DIS '25: Designing Interactive Systems Conference","location":"Funchal Portugal","acronym":"DIS '25"},"container-title":["Companion Publication of the 2025 ACM Designing Interactive Systems Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3715668.3736336","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T08:13:56Z","timestamp":1751703236000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3715668.3736336"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,5]]},"references-count":41,"alternative-id":["10.1145\/3715668.3736336","10.1145\/3715668"],"URL":"https:\/\/doi.org\/10.1145\/3715668.3736336","relation":{},"subject":[],"published":{"date-parts":[[2025,7,5]]},"assertion":[{"value":"2025-07-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}