{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:48:15Z","timestamp":1750308495170,"version":"3.41.0"},"reference-count":94,"publisher":"Association for Computing Machinery (ACM)","issue":"3-4","license":[{"start":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T00:00:00Z","timestamp":1741737600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Science Foundation","award":["1909714"],"award-info":[{"award-number":["1909714"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Trans. Soc. Comput."],"published-print":{"date-parts":[[2025,12,31]]},"abstract":"<jats:p>\n            Designers\u2019 use of deceptive and manipulative design practices have become increasingly ubiquitous, impacting users\u2019 ability to make choices that respect their agency and autonomy. These practices have been popularly defined through the term\n            <jats:italic>dark patterns<\/jats:italic>\n            , which has gained attention from designers, privacy scholars, and, more recently, legal scholars and regulators. The increased interest in the concept of dark patterns across a range of practitioners and users motivated us to study the evolution of the concept and highlight the future trajectory of conversations around dark patterns and similar activist movements that utilize social computing platforms. In this article, we examine the history and evolution of the Twitter (currently known as X) discourse around\n            <jats:italic>#darkpatterns<\/jats:italic>\n            from its inception in June 2010 until April 2021, using a combination of quantitative and qualitative methods to describe how this discourse has changed over time. We frame these conversations through a new concept of\n            <jats:italic>socio-technical activism<\/jats:italic>\n            , whereby participants unite to identify and fight back against problematic technology and design practices. We discuss the potential future trajectories of this discourse and opportunities for further social computing scholarship at the intersection of design, policy, and online activism.\n          <\/jats:p>","DOI":"10.1145\/3716306","type":"journal-article","created":{"date-parts":[[2025,2,3]],"date-time":"2025-02-03T09:50:46Z","timestamp":1738576246000},"page":"1-31","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Tracing the History and Evolution of Dark Patterns on Twitter from 2010-2021"],"prefix":"10.1145","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3910-8890","authenticated-orcid":false,"given":"Ike","family":"Obi","sequence":"first","affiliation":[{"name":"Purdue University, West Lafayette, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7307-1550","authenticated-orcid":false,"given":"Colin","family":"Gray","sequence":"additional","affiliation":[{"name":"Indiana University, Bloomington, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2294-0119","authenticated-orcid":false,"given":"Shruthi","family":"Chivukula","sequence":"additional","affiliation":[{"name":"Pratt Institute, Manhattan, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4091-3264","authenticated-orcid":false,"given":"Ja-Nae","family":"Duane","sequence":"additional","affiliation":[{"name":"Brown University, Providence, United States"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-6529-8445","authenticated-orcid":false,"given":"Janna","family":"Johns","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, United States"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-8084-7603","authenticated-orcid":false,"given":"Matthew","family":"Will","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, United States"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-2461-1715","authenticated-orcid":false,"given":"Ziqing","family":"Li","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2355-030X","authenticated-orcid":false,"given":"Thomas","family":"Carlock","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, United States"}]}],"member":"320","published-online":{"date-parts":[[2025,3,12]]},"reference":[{"volume-title":"Behavioural Study on Unfair Commercial Practices in the Digital Environment: Dark Patterns and Manipulative Personalisation: Final Report","key":"e_1_3_2_2_2","unstructured":"Publications Office of the European Union. 2022. Behavioural Study on Unfair Commercial Practices in the Digital Environment: Dark Patterns and Manipulative Personalisation: Final Report. Publications Office of the European Union. https:\/\/op.europa.eu\/en\/publication-detail\/-\/publication\/606365bc-d58b-11ec-a95f-01aa75ed71a1\/language-en\/format-PDF\/source-257599418"},{"volume-title":"Bringing Dark Patterns to Light Staff Report","key":"e_1_3_2_3_2","unstructured":"Federal Trade Commission. 2022. Bringing Dark Patterns to Light Staff Report. Technical Report. Federal Trade Commission. https:\/\/www.ftc.gov\/system\/files\/ftc_gov\/pdf\/P214800%20Dark%20Patterns%20Report%209.14.2022%20-%20FINAL.pdf"},{"volume-title":"Evidence Review of Online Choice Architecture and Consumer and Competition Harm","key":"e_1_3_2_4_2","unstructured":"Competition & Markets Authority. 2022. Evidence Review of Online Choice Architecture and Consumer and Competition Harm. Technical Report. Competition & Markets Authority. https:\/\/www.gov.uk\/government\/publications\/online-choice-architecture-how-digital-design-can-harm-competition-and-consumers\/evidence-review-of-online-choice-architecture-and-consumer-and-competition-harm"},{"key":"e_1_3_2_5_2","unstructured":"David Stauss. 2022. How Do the CPRA CPA and VCDPA Treat Dark Patterns? Retrieved March 18 2022 from https:\/\/www.jdsupra.com\/legalnews\/how-do-the-cpra-cpa-and-vcdpa-treat-5714239\/. https:\/\/www.jdsupra.com\/legalnews\/how-do-the-cpra-cpa-and-vcdpa-treat-5714239\/"},{"key":"e_1_3_2_6_2","unstructured":"EUR-Lex. 2022. Regulation (EU) 2022\/2065 of the European Parliament and of the Council of 19 October 2022 on a single market for digital services and amending directive 2000\/31\/EC (Digital Services Act). Official Journal of the European Union 65 (October 2022) L277."},{"key":"e_1_3_2_7_2","doi-asserted-by":"crossref","unstructured":"Colin M. Gray Johanna Gunawan Ren\u00e9 Sch\u00e4fer Nataliia Bielova Lorena S\u00e1nchez Chamorro Katie Seaborn Thomas Mildner and Hauke Sandhaus (Eds.). 2024. DDPCHI 2024 mobilizing research and regulatory action on dark patterns and deceptive design practices 2024. In CEUR Workshop Proceedings. Vol. 3720. CEUR. https:\/\/ceur-ws.org\/Vol-3720\/","DOI":"10.1145\/3613905.3636310"},{"key":"e_1_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/3274289"},{"key":"e_1_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1088\/1742-5468\/2008\/10\/P10008"},{"key":"e_1_3_2_10_2","doi-asserted-by":"crossref","DOI":"10.2307\/j.cttq9s20","volume-title":"Ethnography and Virtual Worlds: A Handbook of Method","author":"Boellstorff Tom","year":"2012","unstructured":"Tom Boellstorff, Bonnie Nardi, Celia Pearce, and T. L. Taylor. 2012. Ethnography and Virtual Worlds: A Handbook of Method. Princeton University Press."},{"key":"e_1_3_2_11_2","doi-asserted-by":"crossref","first-page":"763","DOI":"10.1145\/3461778.3462086","volume-title":"Proceedings of the 2021 Designing Interactive Systems Conference","author":"Bongard-Blanchy Kerstin","year":"2021","unstructured":"Kerstin Bongard-Blanchy, Arianna Rossi, Salvador Rivas, Sophie Doublet, Vincent Koenig, and Gabriele Lenzini. 2021. \u201cI am definitely manipulated, even when I am aware of it. It\u2019s ridiculous!\u201d Dark patterns from the end-user perspective. In Proceedings of the 2021 Designing Interactive Systems Conference(DIS \u201921), Vol. 1. ACM, New York, NY, USA, 763\u2013776. DOI:10.1145\/3461778.3462086"},{"issue":"4","key":"e_1_3_2_12_2","doi-asserted-by":"crossref","first-page":"589","DOI":"10.1080\/2159676X.2019.1628806","article-title":"Reflecting on reflexive thematic analysis","volume":"11","author":"Braun Virginia","year":"2019","unstructured":"Virginia Braun and Victoria Clarke. 2019. Reflecting on reflexive thematic analysis. Qualitative Research in Sport, Exercise and Health 11, 4 (2019), 589\u2013597.","journal-title":"Qualitative Research in Sport, Exercise and Health"},{"key":"e_1_3_2_13_2","volume-title":"Thematic Analysis: A Practical Guide","author":"Braun Virginia","year":"2021","unstructured":"Virginia Braun and Victoria Clarke. 2021. Thematic Analysis: A Practical Guide. SAGE."},{"key":"e_1_3_2_14_2","unstructured":"Harry Brignull. 2010. Deceptive Design\u2014Formerly Deceptive Patterns.org. Retrieved February 4 2025 from http:\/\/www.deceptive.design\/"},{"key":"e_1_3_2_15_2","unstructured":"Harry Brignull. 2011. Dark Patterns: Deception vs. Honesty in UI Design. Retrieved February 4 2025 from https:\/\/alistapart.com\/article\/dark-patterns-deception-vs.-honesty-in-ui-design"},{"key":"e_1_3_2_16_2","article-title":"Dark patterns: Inside the interfaces designed to trick you","author":"Brignull Harry","year":"2013","unstructured":"Harry Brignull. 2013. Dark patterns: Inside the interfaces designed to trick you. The Verge. Retrieved February 4, 2025 from https:\/\/www.theverge.com\/2013\/8\/29\/4640308\/dark-patterns-inside-the-interfaces-designed-to-trick-you","journal-title":"The Verge."},{"key":"e_1_3_2_17_2","unstructured":"Harry Brignull Marc Miquel Jeremy Rosenberg and James Offer. 2015. Dark Patterns: User interfaces designed to trick people. Wired. Retrieved February 4 2025 from https:\/\/www.wired.com\/2014\/02\/dark-patterns-user-interfaces-designed-trick-people\/"},{"key":"e_1_3_2_18_2","unstructured":"John Brownlee. 2015. After Lawsuit Settlement LinkedIn\u2019s Dishonest Design Is Now a $13 Million Problem. Retrieved January 20 2025 from https:\/\/www.fastcompany.com\/3051906\/after-lawsuit-settlement-linkedins-dishonest-design-is-now-a-13-million-problem"},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0038"},{"issue":"1","key":"e_1_3_2_20_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3439827","article-title":"A network analysis of Twitter interactions by members of the US Congress","volume":"4","author":"Chamberlain Joshua M.","year":"2021","unstructured":"Joshua M. Chamberlain, Francesca Spezzano, Jaclyn J. Kettler, and Bogdan Dit. 2021. A network analysis of Twitter interactions by members of the US Congress. ACM Transactions on Social Computing 4, 1 (2021), 1\u201322.","journal-title":"ACM Transactions on Social Computing"},{"key":"e_1_3_2_21_2","first-page":"1","volume-title":"Extended Abstracts of the CHI Conference on Human Factors in Computing Systems (CHI EA \u201924)","author":"Chang Weichen Joe","year":"2024","unstructured":"Weichen Joe Chang, Katie Seaborn, and Andrew A. Adams. 2024. Theorizing deception: A scoping review of theory in research on dark patterns and deceptive design. In Extended Abstracts of the CHI Conference on Human Factors in Computing Systems (CHI EA \u201924). ACM, New York, NY, USA, 1\u20137. DOI:10.1145\/3613905.3650997"},{"key":"e_1_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/3586183.3606783"},{"key":"e_1_3_2_23_2","first-page":"LBW1314","volume-title":"Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems (CHI EA \u201919)","author":"Chivukula Shruthi S.","year":"2019","unstructured":"Shruthi S. Chivukula, Chris Watkins, Lucca McKay, and Colin M. Gray. 2019. \u201cNothing comes before profit\u201d: Asshole design in the wild. In Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems (CHI EA \u201919). LBW1314. DOI:10.1145\/3290607.3312863"},{"key":"e_1_3_2_24_2","volume-title":"Proceedings of the 2019 IUI Workshops","author":"Chromik Michael","year":"2019","unstructured":"Michael Chromik, Malin Eiband, Sarah Theres V\u00f6lkel, and Daniel Buschek. 2019. Dark patterns of explainability, transparency, and user control for intelligent systems. In Proceedings of the 2019 IUI Workshops. https:\/\/www.medien.ifi.lmu.de\/pubdb\/publications\/pub\/chromik2019iuiworkshop\/chromik2019iuiworkshop.pdf"},{"key":"e_1_3_2_25_2","unstructured":"Andrea Curley Dympna O\u2019Sullivan Damian Gordon Brendan Tierney and Ioannis Stavrakakis. 2021. The design of a framework for the detection of web-based dark patterns. In Proceedings of the 15th International Conference on Digital Society (ICDS \u201921). https:\/\/arrow.tudublin.ie\/ascnetcon\/3\/"},{"key":"e_1_3_2_26_2","first-page":"2","article-title":"Are dark patterns anticompetitive?","volume":"72","author":"Day Gregory","year":"2020","unstructured":"Gregory Day and Abbey Stemler. 2020. Are dark patterns anticompetitive? Alabama Law Review 72 (2020), 2\u201345.","journal-title":"Alabama Law Review"},{"key":"e_1_3_2_27_2","first-page":"1","volume-title":"Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems","author":"Geronimo Linda Di","year":"2020","unstructured":"Linda Di Geronimo, Larissa Braz, Enrico Fregnan, Fabio Palomba, and Alberto Bacchelli. 2020. UI dark patterns and where to find them: A study on mobile applications and user perception. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems(CHI \u201920). ACM, New York, NY, USA, 1\u201314. DOI:10.1145\/3313831.3376600"},{"key":"e_1_3_2_28_2","doi-asserted-by":"crossref","first-page":"477","DOI":"10.1145\/2441776.2441831","volume-title":"Proceedings of the 2013 Conference on Computer Supported Cooperative Work (CSCW \u201913)","author":"Dimond Jill P.","year":"2013","unstructured":"Jill P. Dimond, Michaelanne Dye, Daphne Larose, and Amy S. Bruckman. 2013. Hollaback! The role of storytelling online in a social movement organization. In Proceedings of the 2013 Conference on Computer Supported Cooperative Work (CSCW \u201913). ACM, New York, NY, USA, 477\u2013490. DOI:10.1145\/2441776.2441831"},{"key":"e_1_3_2_29_2","first-page":"1","article-title":"\u201cComing Out Okay\u201d community narratives for LGBTQ identity recovery work","volume":"3","author":"Dym Brianna","year":"2019","unstructured":"Brianna Dym, Jed R. Brubaker, Casey Fiesler, and Bryan Semaan. 2019. \u201cComing Out Okay\u201d community narratives for LGBTQ identity recovery work. Proceedings of the ACM on Human-Computer Interaction 3, CSCW (2019), 1\u201328.","journal-title":"Proceedings of the ACM on Human-Computer Interaction"},{"key":"e_1_3_2_30_2","volume-title":"Guidelines 3\/2022 on Dark Patterns in Social Media Platform Interfaces: How to Recognise and Avoid Them","author":"Board European Data Protection","year":"2022","unstructured":"European Data Protection Board. 2022. Guidelines 3\/2022 on Dark Patterns in Social Media Platform Interfaces: How to Recognise and Avoid Them. Technical Report. European Data Protection Board. https:\/\/edpb.europa.eu\/our-work-tools\/documents\/public-consultations\/2022\/guidelines-32022-dark-patterns-social-media_en"},{"key":"e_1_3_2_31_2","first-page":"LBW082","volume-title":"Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems","author":"Fansher Madison","year":"2018","unstructured":"Madison Fansher, Shruthi Sai Chivukula, and Colin M. Gray. 2018. #darkpatterns: UX practitioner conversations about ethical design. In Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems(CHI EA \u201918). ACM, New York, NY, USA, LBW082. DOI:10.1145\/3170427.3188553"},{"key":"e_1_3_2_32_2","unstructured":"Federal Trade Commission. 2021. FTC to Ramp Up Enforcement against Illegal Dark Patterns That Trick or Trap Consumers into Subscriptions. Retrieved November 5 2021 from https:\/\/www.ftc.gov\/news-events\/press-releases\/2021\/10\/ftc-ramp-enforcement-against-illegal-dark-patterns-trick-or-trap"},{"key":"e_1_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1177\/2056305118763366"},{"volume-title":"Deceived by Design: How Tech Companies Use Dark Patterns to Discourage Us from Exercising Our Rights to Privacy","year":"2018","key":"e_1_3_2_34_2","unstructured":"Forbrukerr\u00e5det (Norwegian Consumer Council). 2018. Deceived by Design: How Tech Companies Use Dark Patterns to Discourage Us from Exercising Our Rights to Privacy. Technical Report. Forbrukerr\u00e5det (Norwegian Consumer Council)."},{"key":"e_1_3_2_35_2","unstructured":"Aline Shakti Franzke Anja Bechmann Michael Zimmer Charles Ess and Association of Internet Researchers. 2020. Internet Research: Ethical Guidelines 3.0. Retrieved February 4 2025 from https:\/\/aoir.org\/reports\/ethics3.pdf"},{"key":"e_1_3_2_36_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3359198","article-title":"Reclaiming stigmatized narratives: The networked disclosure landscape of #MeToo","volume":"3","author":"Gallagher Ryan J.","year":"2019","unstructured":"Ryan J. Gallagher, Elizabeth Stowell, Andrea G. Parker, and Brooke Foucault Welles. 2019. Reclaiming stigmatized narratives: The networked disclosure landscape of #MeToo. Proceedings of the ACM on Human-Computer Interaction 3, CSCW (2019), 1\u201330.","journal-title":"Proceedings of the ACM on Human-Computer Interaction"},{"key":"e_1_3_2_37_2","unstructured":"Ken Garland. 1964. First Things First Manifesto. Retrieved February 4 2025 from http:\/\/www.designishistory.com\/1960\/first-things-first\/"},{"key":"e_1_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.1002\/9781118611463.wbielsi016"},{"key":"e_1_3_2_39_2","first-page":"172","article-title":"Discourse analysis","volume":"1","author":"Gill Rosalind","year":"2000","unstructured":"Rosalind Gill. 2000. Discourse analysis. Qualitative Researching with Text, Image and Sound 1 (2000), 172\u2013190.","journal-title":"Qualitative Researching with Text, Image and Sound"},{"key":"e_1_3_2_40_2","unstructured":"Milton Glaser. 2004. Ambiguity and Truth. Retrieved May 21 2022 from https:\/\/www.miltonglaser.com\/milton\/c:essays\/#1"},{"key":"e_1_3_2_41_2","volume-title":"Companion Proceedings of the 2019 World Wide Web Conference","author":"Gonz\u00e1lez Felipe","year":"2019","unstructured":"Felipe Gonz\u00e1lez, Yihan Yu, Andrea Figueroa, Claudia L\u00f3pez, and Cecilia Aragon. 2019. Global reactions to the Cambridge Analytica scandal: A cross-language social media study. In Companion Proceedings of the 2019 World Wide Web Conference. ACM, New York, NY, USA, 799\u2013806. DOI:10.1145\/3308560.3316456"},{"key":"e_1_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.33621\/jdsr.v3i1.54"},{"key":"e_1_3_2_43_2","doi-asserted-by":"publisher","DOI":"10.1145\/3479516"},{"key":"e_1_3_2_44_2","doi-asserted-by":"publisher","DOI":"10.1145\/3449144"},{"key":"e_1_3_2_45_2","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1145\/3357236.3395486","volume-title":"Proceedings of the 2020 ACM Designing Interactive Systems Conference (DIS \u201920)","author":"Gray Colin M.","year":"2020","unstructured":"Colin M. Gray, Shruthi Sai Chivukula, and Ahreum Lee. 2020. What kind of work do \u201cAsshole Designers\u201d create? Describing properties of ethical concern on Reddit. In Proceedings of the 2020 ACM Designing Interactive Systems Conference (DIS \u201920). ACM, New York, NY, USA, 61\u201373. DOI:10.1145\/3357236.3395486"},{"key":"e_1_3_2_46_2","volume-title":"Extended Abstracts of the CHI Conference on Human Factors in Computing Systems (CHI EA \u201924)","author":"Gray Colin M.","year":"2024","unstructured":"Colin M. Gray, Johanna Gunawan, Ren\u00e9 Sch\u00e4fer, Nataliia Bielova, Lorena S\u00e1nchez Chamorro, Katie Seaborn, Thomas Mildner, and Hauke Sandhaus. 2024. Mobilizing research and regulatory action on dark patterns and deceptive design practices. In Extended Abstracts of the CHI Conference on Human Factors in Computing Systems (CHI EA \u201924). ACM, New York, NY, USA, Article 482, 6 pages. DOI:10.1145\/3613905.3636310"},{"key":"e_1_3_2_47_2","first-page":"Article 534, 14","volume-title":"Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (CHI \u201918)","author":"Gray Colin M.","year":"2018","unstructured":"Colin M. Gray, Yubo Kou, Bryan Battles, Joseph Hoggatt, and Austin L. Toombs. 2018. The dark (patterns) side of UX design. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (CHI \u201918). ACM, New York, NY, USA, Article 534, 14 pages. DOI:10.1145\/3173574.3174108"},{"key":"e_1_3_2_48_2","first-page":"188","volume-title":"Companion Publication of the 2023 ACM Designing Interactive Systems Conference (DIS \u201923 Companion)","author":"Gray Colin M.","year":"2023","unstructured":"Colin M. Gray, Lorena Sanchez Chamorro, Ike Obi, and Ja-Nae Duane. 2023. Mapping the landscape of dark patterns scholarship: A systematic literature review. In Companion Publication of the 2023 ACM Designing Interactive Systems Conference (DIS \u201923 Companion). ACM, New York, NY, USA, 188\u2013193. DOI:10.1145\/3563703.3596635"},{"key":"e_1_3_2_49_2","volume-title":"Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems (CHI EA \u201923)","author":"Gray Colin M.","year":"2023","unstructured":"Colin M. Gray, Cristiana Santos, and Nataliia Bielova. 2023. Towards a preliminary ontology of dark patterns knowledge. In Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems (CHI EA \u201923). ACM, New York, NY, USA, Article 286, 9 pages. DOI:10.1145\/3544549.3585676"},{"key":"e_1_3_2_50_2","first-page":"Article 172, 18","volume-title":"Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems","author":"Gray Colin M.","year":"2021","unstructured":"Colin M. Gray, Cristiana Santos, Nataliia Bielova, Michael Toth, and Damian Clifford. 2021. Dark patterns and the legal requirements of consent banners: An interaction criticism perspective. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems(CHI \u201921). ACM, New York, NY, USA, Article 172, 18 pages. DOI:10.1145\/3411764.3445779"},{"key":"e_1_3_2_51_2","volume-title":"Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems (CHI EA \u201923)","author":"Gray Colin M.","year":"2023","unstructured":"Colin M. Gray, Cristiana Santos, Nicole Tong, Thomas Mildner, Arianna Rossi, Johanna Gunawan, and Caroline Sinders. 2023. Dark patterns and the emerging threats of deceptive design practices. In Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems (CHI EA \u201923). ACM, New York, NY, USA, Article 510, 4 pages. DOI:10.1145\/3544549.3583173"},{"key":"e_1_3_2_52_2","first-page":"Article 289, 22","volume-title":"Proceedings of the CHI Conference on Human Factors in Computing Systems (CHI \u201924)","author":"Gray Colin M.","year":"2024","unstructured":"Colin M. Gray, Cristiana Teixeira Santos, Nataliia Bielova, and Thomas Mildner. 2024. An ontology of dark patterns knowledge: Foundations, definitions, and a pathway for shared knowledge-building. In Proceedings of the CHI Conference on Human Factors in Computing Systems (CHI \u201924). ACM, New York, NY, USA, Article 289, 22 pages. DOI:10.1145\/3613904.3642436"},{"key":"e_1_3_2_53_2","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1145\/2598510.2598541","volume-title":"Proceedings of the 2014 Conference on Designing Interactive Systems (DIS \u201914)","author":"Greenberg Saul","year":"2014","unstructured":"Saul Greenberg, Sebastian Boring, Jo Vermeulen, and Jakub Dostal. 2014. Dark patterns in proxemic interactions: A critical perspective. In Proceedings of the 2014 Conference on Designing Interactive Systems (DIS \u201914). ACM, New York, NY, USA, 523\u2013532. DOI:10.1145\/2598510.2598541"},{"key":"e_1_3_2_54_2","doi-asserted-by":"publisher","DOI":"10.1145\/3479521"},{"key":"e_1_3_2_55_2","doi-asserted-by":"crossref","DOI":"10.4324\/9781315266510","volume-title":"Fundamentals of Descriptive Statistics","author":"Holcomb Zealure","year":"2016","unstructured":"Zealure Holcomb. 2016. Fundamentals of Descriptive Statistics. Routledge."},{"issue":"1","key":"e_1_3_2_56_2","first-page":"37","article-title":"Efficient, high-quality force-directed graph drawing","volume":"10","author":"Hu Yifan","year":"2005","unstructured":"Yifan Hu. 2005. Efficient, high-quality force-directed graph drawing. Mathematica Journal 10, 1 (2005), 37\u201371.","journal-title":"Mathematica Journal"},{"key":"e_1_3_2_57_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12599-020-00633-4"},{"key":"e_1_3_2_58_2","doi-asserted-by":"publisher","DOI":"10.1145\/3444961"},{"key":"e_1_3_2_59_2","article-title":"Understanding the resilience of caste: A critical discourse analysis of community profiles on X","author":"Kirasur Nayana","year":"2024","unstructured":"Nayana Kirasur and Shagun Jhaver. 2024. Understanding the resilience of caste: A critical discourse analysis of community profiles on X. arXiv preprint arXiv:2407.02810 (2024).","journal-title":"arXiv preprint arXiv:2407.02810"},{"key":"e_1_3_2_60_2","doi-asserted-by":"publisher","DOI":"10.1145\/3283827"},{"key":"e_1_3_2_61_2","first-page":"1","article-title":"Conspiracy talk on social media: Collective sensemaking during a public health crisis","volume":"1","author":"Kou Yubo","year":"2017","unstructured":"Yubo Kou, Xinning Gui, Yunan Chen, and Kathleen Pine. 2017. Conspiracy talk on social media: Collective sensemaking during a public health crisis. Proceedings of the ACM on Human-Computer Interaction 1, CSCW (2017), 1\u201321.","journal-title":"Proceedings of the ACM on Human-Computer Interaction"},{"key":"e_1_3_2_62_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10606-017-9284-y"},{"key":"e_1_3_2_63_2","first-page":"3883","volume-title":"Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI \u201916)","author":"Kow Yong Ming","year":"2016","unstructured":"Yong Ming Kow, Yubo Kou, Bryan Semaan, and Waikuen Cheng. 2016. Mediating the undercurrents: Using social media to sustain a social movement. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI \u201916). ACM, New York, NY, USA, 3883\u20133894. DOI:10.1145\/2858036.2858186"},{"key":"e_1_3_2_64_2","first-page":"374","volume-title":"Proceedings of the 2019 14th ACM\/IEEE International Conference on Human-Robot Interaction (HRI \u201919)","author":"Lacey Cherie","year":"2019","unstructured":"Cherie Lacey and Catherine Caudwell. 2019. Cuteness as a \u2018Dark Pattern\u2019 in home robots. In Proceedings of the 2019 14th ACM\/IEEE International Conference on Human-Robot Interaction (HRI \u201919). 374\u2013381. DOI:10.1109\/HRI.2019.8673274"},{"key":"e_1_3_2_65_2","doi-asserted-by":"publisher","DOI":"10.1145\/3274375"},{"key":"e_1_3_2_66_2","doi-asserted-by":"publisher","DOI":"10.1145\/3134707"},{"key":"e_1_3_2_67_2","doi-asserted-by":"publisher","DOI":"10.1093\/jla\/laaa006"},{"key":"e_1_3_2_68_2","doi-asserted-by":"publisher","DOI":"10.17011\/ht\/urn.202008245641"},{"key":"e_1_3_2_69_2","doi-asserted-by":"publisher","DOI":"10.1145\/3359183"},{"key":"e_1_3_2_70_2","first-page":"1","volume-title":"Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems","author":"Mathur Arunesh","year":"2021","unstructured":"Arunesh Mathur, Mihir Kshirsagar, and Jonathan Mayer. 2021. What makes a dark pattern... dark? Design attributes, normative considerations, and measurement methods. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems(CHI \u201921). ACM, New York, NY, USA, 1\u201318. DOI:10.1145\/3411764.3445610"},{"key":"e_1_3_2_71_2","volume-title":"Qualitative Research Design: An Interactive Approach (2nd ed.)","author":"Maxwell Joseph A.","year":"2004","unstructured":"Joseph A. Maxwell. 2004. Qualitative Research Design: An Interactive Approach (2nd ed.). SAGE Publications."},{"key":"e_1_3_2_72_2","first-page":"Article 464, 7","volume-title":"Extended Abstracts of the 2021 CHI Conference on Human Factors in Computing Systems","author":"Mildner Thomas","year":"2021","unstructured":"Thomas Mildner and Gian-Luca Savino. 2021. Ethical user interfaces: Exploring the effects of dark patterns on Facebook. In Extended Abstracts of the 2021 CHI Conference on Human Factors in Computing Systems(CHI EA \u201921). ACM, New York, NY, USA, Article 464, 7 pages. DOI:10.1145\/3411763.3451659"},{"key":"e_1_3_2_73_2","doi-asserted-by":"publisher","DOI":"10.1145\/3446981"},{"volume-title":"How dark patterns trick you online","year":"2018","key":"e_1_3_2_74_2","unstructured":"Nerdwriter1. 2018. How dark patterns trick you online. YouTube. Retrieved February 4, 2025 from https:\/\/youtu.be\/kxkrdLI6e6M"},{"key":"e_1_3_2_75_2","doi-asserted-by":"crossref","DOI":"10.4135\/9781071802878","volume-title":"The Content Analysis Guidebook","author":"Neuendorf Kimberly A.","year":"2017","unstructured":"Kimberly A. Neuendorf. 2017. The Content Analysis Guidebook. SAGE."},{"key":"e_1_3_2_76_2","first-page":"1","volume-title":"Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (CHI \u201920)","author":"Nouwens Midas","year":"2020","unstructured":"Midas Nouwens, Ilaria Liccardi, Michael Veale, David Karger, and Lalana Kagal. 2020. Dark patterns after the GDPR: Scraping consent pop-ups and demonstrating their influence. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (CHI \u201920). ACM, New York, NY, USA, 1\u201313. DOI:10.1145\/3313831.3376321"},{"key":"e_1_3_2_77_2","doi-asserted-by":"publisher","DOI":"10.1787\/44f5e846-en"},{"key":"e_1_3_2_78_2","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1145\/1718918.1718976","volume-title":"Proceedings of the 2010 ACM Conference on Computer Supported Cooperative Work","author":"Paul Sharoda A.","year":"2010","unstructured":"Sharoda A. Paul and Madhu C. Reddy. 2010. Understanding together: Sensemaking in collaborative information seeking. In Proceedings of the 2010 ACM Conference on Computer Supported Cooperative Work. 321\u2013330."},{"key":"e_1_3_2_79_2","volume-title":"Companion Publication of the 2019 Conference on Computer Supported Cooperative Work and Social Computing (CSCW \u201919 Companion)","author":"Rezapour Rezvaneh","year":"2019","unstructured":"Rezvaneh Rezapour, Priscilla Ferronato, and Jana Diesner. 2019. How do moral values differ in tweets on social movements? In Companion Publication of the 2019 Conference on Computer Supported Cooperative Work and Social Computing (CSCW \u201919 Companion). ACM, New York, NY, USA, 347\u2013351. DOI:10.1145\/3311957.3359496"},{"key":"e_1_3_2_80_2","doi-asserted-by":"publisher","DOI":"10.1145\/3274416"},{"key":"e_1_3_2_81_2","doi-asserted-by":"publisher","DOI":"10.1145\/3359299"},{"key":"e_1_3_2_82_2","first-page":"1621","volume-title":"Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (CHI \u201915)","author":"Salehi Niloufar","year":"2015","unstructured":"Niloufar Salehi, Lilly C. Irani, Michael S Bernstein, Ali Alkhatib, Eva Ogbe, Kristy Milland, and Clickhappier. 2015. We are dynamo: Overcoming stalling and friction in collective action for crowd workers. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (CHI \u201915). ACM, New York, New York, USA, 1621\u20131630. DOI:10.1145\/2702123.2702508"},{"key":"e_1_3_2_83_2","first-page":"724","volume-title":"Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW \u201915)","author":"Savage Saiph","year":"2015","unstructured":"Saiph Savage and Andr\u00e9s Monroy-Hern\u00e1ndez. 2015. Participatory militias: An analysis of an armed movement\u2019s online audience. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW \u201915). ACM, New York, NY, USA, 724\u2013733. DOI:10.1145\/2675133.2675295"},{"key":"e_1_3_2_84_2","first-page":"1","volume-title":"Proceedings of the 11th Nordic Conference on Human-Computer Interaction: Shaping Experiences, Shaping Society","author":"Soe Than Htut","year":"2020","unstructured":"Than Htut Soe, Oda Elise Nordberg, Frode Guribye, and Marija Slavkovik. 2020. Circumvention by design\u2014Dark patterns in cookie consent for online news outlets. In Proceedings of the 11th Nordic Conference on Human-Computer Interaction: Shaping Experiences, Shaping Society. ACM, New York, NY, USA, 1\u201312. DOI:10.1145\/3419249.3420132"},{"key":"e_1_3_2_85_2","doi-asserted-by":"publisher","DOI":"10.1145\/3641000"},{"key":"e_1_3_2_86_2","doi-asserted-by":"publisher","DOI":"10.1145\/3359229"},{"key":"e_1_3_2_87_2","doi-asserted-by":"crossref","first-page":"491","DOI":"10.1145\/2441776.2441832","volume-title":"Proceedings of the 2013 Conference on Computer Supported Cooperative Work (CSCW \u201913)","author":"Starbird Kate","year":"2013","unstructured":"Kate Starbird and Leysia Palen. 2013. Working and sustaining the virtual \u201cDisaster Desk.\u201d In Proceedings of the 2013 Conference on Computer Supported Cooperative Work (CSCW \u201913). ACM, New York, NY, USA, 491. DOI:10.1145\/2441776.2441832"},{"key":"e_1_3_2_88_2","first-page":"1741","volume-title":"Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW \u201915)","author":"State Bogdan","year":"2015","unstructured":"Bogdan State and Lada Adamic. 2015. The diffusion of support in an online social movement: Evidence from the adoption of equal-sign profile pictures. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work and Social Computing (CSCW \u201915). ACM, New York, NY, USA, 1741\u20131750. DOI:10.1145\/2675133.2675290"},{"key":"e_1_3_2_89_2","doi-asserted-by":"publisher","unstructured":"Ioannis Stavrakakis Andrea Curley Dympna O\u2019Sullivan Damian Gordon and Brendan Tierney. 2021. A framework of web-based dark patterns that can be detected manually or automatically. International Journal on Advances in Internet Technology 14 1-2 (2021) 36\u201345. DOI:10.21427\/20g8-d176","DOI":"10.21427\/20g8-d176"},{"key":"e_1_3_2_90_2","doi-asserted-by":"publisher","DOI":"10.1145\/3134920"},{"key":"e_1_3_2_91_2","volume-title":"Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (CWSC \u201917)","author":"Twyman Marlon","year":"2017","unstructured":"Marlon Twyman, Brian C. Keegan, and Aaron Shaw. 2017. Black lives matter in Wikipedia: Collective memory and collaboration around online social movements. In Proceedings of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (CWSC \u201917). ACM, New York, NY, USA, 1400\u20131412. DOI:10.1145\/2998181.2998232"},{"key":"e_1_3_2_92_2","article-title":"The EU General Data Protection Regulation (GDPR)","author":"Voigt Paul","year":"2017","unstructured":"Paul Voigt and Axel Von dem Bussche. 2017. The EU General Data Protection Regulation (GDPR): A Practical Guide. Springer International Publishing, Cham, Switzerland.","journal-title":"A Practical Guide. Springer International Publishing, Cham, Switzerland."},{"key":"e_1_3_2_93_2","unstructured":"Mark R. Warner. 2021. DETOUR Act. Retrieved February 4 2025 from http:\/\/www.congress.gov\/"},{"key":"e_1_3_2_94_2","volume-title":"Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work and Social Computing (CWSC \u201914)","author":"White Joanne I.","year":"2014","unstructured":"Joanne I. White, Leysia Palen, and Kenneth M. Anderson. 2014. Digital mobilization in disaster response: The work & self-organization of on-line pet advocates in response to Hurricane Sandy. In Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work and Social Computing (CWSC \u201914). ACM, New York, NY, USA, 866\u2013876. DOI:10.1145\/2531602.2531633"},{"key":"e_1_3_2_95_2","volume-title":"Proceedings of the 2013 Conference on Foundations of Digital Games (FDG \u201913)","author":"Zagal Jos\u00e9 P.","year":"2013","unstructured":"Jos\u00e9 P. Zagal, Staffan Bj\u00f6rk, and Chris Lewis. 2013. Dark patterns in the design of games. In Proceedings of the 2013 Conference on Foundations of Digital Games (FDG \u201913). 7. http:\/\/www.diva-portal.org\/smash\/record.jsf?pid=diva2%3A1043332&dswid=1018"}],"container-title":["ACM Transactions on Social Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3716306","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3716306","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T18:43:42Z","timestamp":1750272222000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3716306"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,12]]},"references-count":94,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2025,12,31]]}},"alternative-id":["10.1145\/3716306"],"URL":"https:\/\/doi.org\/10.1145\/3716306","relation":{},"ISSN":["2469-7818","2469-7826"],"issn-type":[{"type":"print","value":"2469-7818"},{"type":"electronic","value":"2469-7826"}],"subject":[],"published":{"date-parts":[[2025,3,12]]},"assertion":[{"value":"2023-07-28","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-01-17","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-03-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}