{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T11:31:56Z","timestamp":1758281516083,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","funder":[{"name":"ITI\/Larsys, FCT Project","award":["10.54499\/LA\/P\/0083\/2020, 10.54499\/UIDP\/50009\/2020, 10.54499\/UIDB\/50009\/2020"],"award-info":[{"award-number":["10.54499\/LA\/P\/0083\/2020, 10.54499\/UIDP\/50009\/2020, 10.54499\/UIDB\/50009\/2020"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,3]]},"DOI":"10.1145\/3719236.3719243","type":"proceedings-article","created":{"date-parts":[[2025,9,18]],"date-time":"2025-09-18T16:25:53Z","timestamp":1758212753000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["How to Control a User: A Critical Design Project on Persuasive Patterns in Social Media"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9161-5400","authenticated-orcid":false,"given":"S\u00f3nia","family":"Rafael","sequence":"first","affiliation":[{"name":"ITI \/ LARSyS, Faculty of Fine Arts, University of Lisbon, Lisboan, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6174-3658","authenticated-orcid":false,"given":"Sofia","family":"Leal Rodrigues","sequence":"additional","affiliation":[{"name":"CIEBA, Centro de Investiga\u00e7\u00e3o e de Estudos em Belas-Artes, Lisbon, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-3797-5100","authenticated-orcid":false,"given":"Sofia Petito","family":"Alexandre","sequence":"additional","affiliation":[{"name":"Faculdade de Belas-Artes - ULisboa, Lisbon, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-3045-7399","authenticated-orcid":false,"given":"Matilde","family":"Reis","sequence":"additional","affiliation":[{"name":"Faculdade de Belas-Artes - ULisboa, Lisbon, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2025,9,18]]},"reference":[{"key":"e_1_3_3_1_1_2","unstructured":"Swindler K. 2021. Life and Death Design. What Life-Saving Technology Can Teach Everyday UX Designers. Rosenfeld Media."},{"key":"e_1_3_3_1_2_2","unstructured":"Anderson M. 2016. Deceptive Design is Illegal Now so Why Are You Still Getting Swindled? AIGA Design Magazine. Retrieved from https:\/\/eyeondesign.aiga.org\/deceptive-design-is-illegal-now-so-why-are-you-still-getting-swindled\/"},{"key":"e_1_3_3_1_3_2","unstructured":"Dunne A. and Raby F. 2013. Speculative Everything. MIT Press."},{"key":"e_1_3_3_1_4_2","first-page":"37","article-title":"Designing organizations for an information-rich world. In Computers, Communications, and the Public Interest, Johns Hopkins Press, Baltimore","author":"Simon H. A.","year":"1971","unstructured":"Simon, H. A., Deutsch, K. W., and Shubik, M. 1971. Designing organizations for an information-rich world. In Computers, Communications, and the Public Interest, Johns Hopkins Press, Baltimore, Md., 37-72.","journal-title":"Md."},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0704916104"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68504-3_3"},{"key":"e_1_3_3_1_7_2","unstructured":"Vivrekar D. 2018. Persuasive Design Techniques in the Attention Economy: User Awareness Theory and Ethics. Stanford Digital Repository. Retrieved from https:\/\/purl.stanford.edu\/rq188wb9000"},{"key":"e_1_3_3_1_8_2","volume-title":"Retrieved on","author":"Harris S. n.d.","year":"2022","unstructured":"Harris, S. n.d. Waking Up Podcast #71 \u2014 What is Technology Doing to Us? In Sam Harris [Podcast]. Retrieved on February 20, 2022, from https:\/\/wakingup.libsyn.com\/71-what-is-technology-doing-to-us"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/301353.301410"},{"key":"e_1_3_3_1_10_2","volume-title":"Compliance, Propaganda, Brain Washing, & Social Psychology. Retrieved on","author":"Rhoads","year":"2022","unstructured":"Rhoads. Definitions: Persuasion, Compliance, Propaganda, Brain Washing, & Social Psychology. Retrieved on March 8, 2022, from http:\/\/www.workingpsychology.com\/definit.html"},{"key":"e_1_3_3_1_11_2","volume-title":"Persuasive Technology: First International Conference on Persuasive Technology for Human Well-Being, PERSUASIVE.","author":"Ijsselsteijn W.","unstructured":"Ijsselsteijn, W., de Kort, Y., Midden, C., Eggen, B., and van den Hoven, E. 2006. Persuasive Technology: First International Conference on Persuasive Technology for Human Well-Being, PERSUASIVE."},{"key":"e_1_3_3_1_12_2","unstructured":"Harris T. 2020. The Social Dilemma. Retrieved on February 21 from https:\/\/www.netflix.com\/pt\/title\/81254224"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.5555\/640634"},{"key":"e_1_3_3_1_14_2","unstructured":"Edelman J. 2019. What's Next? - The School for Social Design. Medium. Retrieved from https:\/\/medium.com\/what-to-build\/whats-next-4b4d00bd9403"},{"key":"e_1_3_3_1_15_2","unstructured":"Roettgers J. 2018. For Facebook Change Is Political. For Google It's Personal. In Variety. Retrieved from http:\/\/variety.com\/2018\/digital\/news\/google-personal-wellbeing-online-abuse-1202803655\/"},{"key":"e_1_3_3_1_16_2","unstructured":"Constine J. 2018. Instagram CEO confirms upcoming \u201ctime spent\u201d Usage Insights. In TechCrunch. Retrieved from http:\/\/social.techcrunch.com\/2018\/05\/15\/instagram-usage-insights\/"},{"key":"e_1_3_3_1_17_2","unstructured":"Davenport T. H. and Beck J.C. 2002. The Attention Economy: Understanding the New Currency of Business. Harvard Business Press."},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2010.369"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"publisher","unstructured":"Mark G. Gudith D. and Klocke U. 2008. The cost of interrupted work. In Proceeding of the twenty-sixth annual CHI conference on Human factors in computing systems. CHI \u201908. DOI: 10.1145\/1357054.1357072","DOI":"10.1145\/1357054.1357072"},{"key":"e_1_3_3_1_20_2","volume-title":"Just Breathe: Building the case for Email Apnea. In HuffPost. HuffPost.","author":"Stone L.","year":"2008","unstructured":"Stone, L. 2008. Just Breathe: Building the case for Email Apnea. In HuffPost. HuffPost. Retrieved from https:\/\/www.huffingtonpost.com\/linda-stone\/just-breathe-building-the_b_85651.html"},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"publisher","unstructured":"McFarlane L. 2009. The Scope and Importance of Human Interruption in Human-Computer Interaction Design. Human-Computer Interaction. Retrieved from 10.1207\/S15327051HCI1701_1","DOI":"10.1207\/S15327051HCI1701_1"},{"key":"e_1_3_3_1_22_2","unstructured":"Shrager J. 2015. Demandance. Retrieved from http:\/\/arxiv.org\/abs\/1507.01882"},{"issue":"4","key":"e_1_3_3_1_23_2","first-page":"86","article-title":"Attention and consciousness","volume":"15","author":"Mole C.","year":"2008","unstructured":"Mole, C. 2008. Attention and consciousness. Journal of Consciousness Studies. 15, 4, 86-104.","journal-title":"Journal of Consciousness Studies."},{"key":"e_1_3_3_1_24_2","volume-title":"Retrieved on","author":"Williams J.","year":"2016","unstructured":"Williams, J. 2016. The philosophy and ethics of attention and persuasion. Retrieved on February 20, 2022, from https:\/\/onlinedialogue.nl\/wp-content\/uploads\/2016\/06\/James-Williams-DPI-talk-in-Utrecht-June-2016.compressed.pdf"},{"key":"e_1_3_3_1_25_2","doi-asserted-by":"crossref","unstructured":"Couldry N. and Mejias U.A. 2019. The Costs of Connection: How Data is Colonizing Human Life and Appropriating it for Capitalism. Stanford University Press California.","DOI":"10.1515\/9781503609754"},{"key":"e_1_3_3_1_26_2","volume-title":"The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power","author":"Zuboff S.","unstructured":"Zuboff, S. 2018. The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power. Public Affairs, New York."},{"key":"e_1_3_3_1_27_2","volume-title":"Persuasive Technology: How does technology use design to influence my behavior? Center for Humane Technology.","author":"Center for Humane Technology.","year":"2021","unstructured":"Center for Humane Technology. 2021. Persuasive Technology: How does technology use design to influence my behavior? Center for Humane Technology. Retrieved from https:\/\/www.humanetech.com\/youth\/persuasive-technology"},{"key":"e_1_3_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.15540\/nr.5.1.3"},{"key":"e_1_3_3_1_29_2","unstructured":"Castmo M. and Persson R. 2018. The alliance of Digital Nudging & Persuasive Design: The Complementary Nature of the Design Strategies."},{"key":"e_1_3_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1007\/s12599-016-0453-1"},{"key":"e_1_3_3_1_31_2","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1038\/oby.2005.12","article-title":"Bottomless bowls: why visual cues of portion size may influence intake","volume":"13","author":"Wansink B.","year":"2005","unstructured":"Wansink, B., Painter, J., and North, J. 2005. Bottomless bowls: why visual cues of portion size may influence intake. Obes Res. 13, 93\u2013100.","journal-title":"Obes Res."},{"key":"e_1_3_3_1_32_2","volume-title":"Social media copies gambling methods \u201cto create psychological cravings","author":"Kruger D.","year":"2018","unstructured":"Kruger, D. (2018). Social media copies gambling methods \u201cto create psychological cravings.\u201d Institute for Healthcare Policy & Innovation. Dispon\u00edvel em: https:\/\/ihpi.umich.edu\/news\/social-media-copies-gambling-methods-create-psychological-cravings"},{"key":"e_1_3_3_1_33_2","volume-title":"Addiction by design: machine gambling in Las Vegas","author":"Sch\u00fcll N.","unstructured":"Sch\u00fcll, N. 2012. Addiction by design: machine gambling in Las Vegas. Princeton University Press, Princeton, New Jersey."},{"key":"e_1_3_3_1_34_2","volume-title":"n.d. Dark Patterns. Retrieved on","author":"Brignull H.","year":"2022","unstructured":"Brignull, H. n.d. Dark Patterns. Retrieved on March 8, 2022, from https:\/\/www.deceptive.design"},{"key":"e_1_3_3_1_35_2","volume-title":"Retrieved","author":"Sauro J.","year":"2011","unstructured":"Sauro, J. (2011). Measuring Usability with the System Usability Scale (SUS) \u2013 MeasuringU. Retrieved September 14, 2022, from https:\/\/measuringu.com\/sus"},{"issue":"140","key":"e_1_3_3_1_36_2","first-page":"1","article-title":"A technique for the measurement of attitudes","volume":"22","author":"Likert R.","year":"1932","unstructured":"Likert, R. (1932). A technique for the measurement of attitudes. Archives of Psychology, 22(140), 1-55.","journal-title":"Archives of Psychology"},{"key":"e_1_3_3_1_37_2","volume-title":"10 Things to Know About the Single Ease Question (SEQ). Measuring U","author":"Sauro J.","year":"2020","unstructured":"Sauro. J. (2020). 10 Things to Know About the Single Ease Question (SEQ). Measuring U (2012). https:\/\/measuringu.com\/seq10"}],"event":{"name":"KUI 2024: Culture and Computer Science","location":"Florence Italy","acronym":"KUI 2024"},"container-title":["Proceedings of the 21th International Conference on Culture and Computer Science: from Humanism to Digital Humanities"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3719236.3719243","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,18]],"date-time":"2025-09-18T16:26:46Z","timestamp":1758212806000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3719236.3719243"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,3]]},"references-count":37,"alternative-id":["10.1145\/3719236.3719243","10.1145\/3719236"],"URL":"https:\/\/doi.org\/10.1145\/3719236.3719243","relation":{},"subject":[],"published":{"date-parts":[[2024,10,3]]},"assertion":[{"value":"2025-09-18","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}