{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T21:42:16Z","timestamp":1759700536573,"version":"build-2065373602"},"reference-count":91,"publisher":"Association for Computing Machinery (ACM)","issue":"6","funder":[{"DOI":"10.13039\/501100002241","name":"Japan Science and Technology Agency","doi-asserted-by":"publisher","award":["JPMJPR24I6"],"award-info":[{"award-number":["JPMJPR24I6"]}],"id":[{"id":"10.13039\/501100002241","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2025,10,5]]},"abstract":"<jats:p>Mobile games have gained immense popularity due to their accessibility, allowing people to play anywhere, anytime. Dark patterns and deceptive designs (DPs) have been found in these and other gaming platforms within certain cultural contexts. Here, we explored DPs in the onboarding experiences of free-to-play mobile games from China and Japan. We identified several unique patterns and mapped their relative prevalence. We also found that game developers often employ combinations of DPs as a strategy (\u201cDP Combos\u201d) and use elements that, while not inherently manipulative, can enhance the impact of known patterns (\u201cDP Enhancers\u201d). Guided by these findings, we then developed an enriched ontology for categorizing deceptive game design patterns into classes and subclasses. This research contributes to understanding deceptive game design patterns and offers insights for future studies on cultural dimensions and ethical game design in general.<\/jats:p>","DOI":"10.1145\/3748620","type":"journal-article","created":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T21:01:11Z","timestamp":1759698071000},"page":"730-755","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["First Contact with Dark Patterns and Deceptive Designs in Chinese and Japanese Free-to-Play Mobile Games"],"prefix":"10.1145","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-9648-8252","authenticated-orcid":false,"given":"Gloria Xiaodan","family":"Zhang","sequence":"first","affiliation":[{"name":"Institute of Science Tokyo, Tokyo, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-2250-9163","authenticated-orcid":false,"given":"Yijia","family":"Wang","sequence":"additional","affiliation":[{"name":"Institute of Science Tokyo, Tokyo, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-7325-9074","authenticated-orcid":false,"given":"Taro Leo","family":"Nakajima","sequence":"additional","affiliation":[{"name":"Institute of Science Tokyo, Tokyo, Japan"},{"name":"Stuttgart Media University, Stuttgart, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7812-9096","authenticated-orcid":false,"given":"Katie","family":"Seaborn","sequence":"additional","affiliation":[{"name":"Institute of Science Tokyo, Tokyo, Japan"},{"name":"University of Cambridge, Cambridge, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2025,10,5]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3472301.3484336"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.intcom.2006.08.008"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1037\/pro0000150"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3665463.3678781"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10208-5_5"},{"key":"e_1_2_1_6_1","unstructured":"Josh Bycer. 2019. Video game onboarding. https:\/\/medium.com\/super-jump\/video-game-onboarding-a52ae1db80fa"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300733"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1177\/1461444813497555"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2658537.2658540"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3197391.3205417"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.08.017"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.33322\/PETIR.V15I2.1151"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/950566.950583"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376600"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3311927.3323136"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3549510"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3549489"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1177\/0146167209333045"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2023.107766"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1037\/a0034857"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642436"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479521"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3677074"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3665463.3678820"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.11.045"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1017\/S1867299X00002762"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580942"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-15985-0_9"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3481127.3481190"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1111\/poms.13772"},{"key":"e_1_2_1_31_1","article-title":"Mobile Phone Users\u2019 Behaviors: The Motivation Factors of the Mobile Phone User","volume":"3","author":"Jin Chang Hyun","year":"2008","unstructured":"Chang Hyun Jin and Jorge Villegas. 2008. Mobile Phone Users\u2019 Behaviors: The Motivation Factors of the Mobile Phone User. International Journal of Mobile Marketing, 3, 2 (2008), 4 pages. issn:1939-1161","journal-title":"International Journal of Mobile Marketing"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-16-8004-5"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341215.3356271"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1177\/1469540521993930"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-12453-3_54"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1177\/1071181321651317"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.69554\/GZXP2281"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1037\/a0019441"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3611053"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-41504-3_4"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1152215.1152218"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.2478\/ethemes-2022-0004"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.3389\/fnhum.2015.00212"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.5555\/3378680.3378736"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.5555\/2812774.2812779"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222310206"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2020.106592"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.addbeh.2019.05.016"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.25236\/AJBM.2023.050101"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1093\/jla\/laaa006"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2023.1259319"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-34350-7_46"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359183"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445610"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-41504-3_7"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1177\/1555412019887658"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1177\/2056305115621932"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2017.00695"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/fqz014"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3639701.3656318"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3502056"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-021-04970-6"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1080\/15213269.2023.2242260"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2021.106538"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.46743\/2160-3715\/2006.1666"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1037\/a0019440"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.3233\/978-1-60750-017-9-189"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3563657.3596013"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555142"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1080\/00913367.2015.1018460"},{"key":"e_1_2_1_71_1","first-page":"53","article-title":"Kawaii Japan","volume":"5","author":"Schules Douglas","year":"2015","unstructured":"Douglas Schules. 2015. Kawaii Japan: Defining JRPGs Through the Cultural Media Mix. Kinephanos: Journal of Media Studies and Popular Culture, 5, 1 (2015), 53\u201376.","journal-title":"Defining JRPGs Through the Cultural Media Mix. Kinephanos: Journal of Media Studies and Popular Culture"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/VS-GAMES.2009.25"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1080\/08911762.2024.2375709"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.34190\/ecgbl.17.1.1656"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12232-017-0280-9"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/1077246.1077253"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.5937\/MegRev1703239T"},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/3659464"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2018.10.010"},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.62051\/g29kdn38"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11761-022-00335-7"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.4309\/LDOM8890"},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1525\/collabra.57641"},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1177\/1555412005281819"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1007\/s40429-021-00386-4"},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.3998\/mij.15031809.0005.106"},{"key":"e_1_2_1_87_1","volume-title":"Foundations of Digital Games 2013 (FDG","author":"Zagal Jos\u00e9 P.","year":"2013","unstructured":"Jos\u00e9 P. Zagal, Staffan Bj\u00f6rk, and Chris Lewis. 2013. Dark Patterns in the Design of Games. In Foundations of Digital Games 2013 (FDG 2013). ACM, New York, NY, USA. 8 pages."},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.7717\/peerj.9466"},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0232780"},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1111\/add.14973"},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1145\/3637374"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3748620","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T21:01:59Z","timestamp":1759698119000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3748620"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,5]]},"references-count":91,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,10,5]]}},"alternative-id":["10.1145\/3748620"],"URL":"https:\/\/doi.org\/10.1145\/3748620","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,5]]},"assertion":[{"value":"2025-02-19","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-07-24","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-10-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}