{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T02:10:58Z","timestamp":1760667058034,"version":"build-2065373602"},"reference-count":138,"publisher":"Association for Computing Machinery (ACM)","issue":"7","funder":[{"name":"the Office of the Privacy Commissioner of Canada","award":["Contributions Program 2024-2025"],"award-info":[{"award-number":["Contributions Program 2024-2025"]}]},{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council","doi-asserted-by":"crossref","award":["Discovery Grant (#RGPIN-2022-03353)"],"award-info":[{"award-number":["Discovery Grant (#RGPIN-2022-03353)"]}],"id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100000155","name":"Social Sciences and Humanities Research Council","doi-asserted-by":"crossref","award":["INSIGHT Grant (435-2022-0476)"],"award-info":[{"award-number":["INSIGHT Grant (435-2022-0476)"]}],"id":[{"id":"10.13039\/501100000155","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"crossref","award":["Discovery Grant (RGPIN-2023-03705)"],"award-info":[{"award-number":["Discovery Grant (RGPIN-2023-03705)"]}],"id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100000196","name":"Canada Foundation for Innovation","doi-asserted-by":"crossref","award":["John R. Evans Leaders Fund (41844)"],"award-info":[{"award-number":["John R. Evans Leaders Fund (41844)"]}],"id":[{"id":"10.13039\/501100000196","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2025,10,18]]},"abstract":"<jats:p>Virtual Reality (VR) technologies offer immersive experiences but collect substantial user data. While deceptive design is well-studied in 2D platforms, little is known about its manifestation in VR environments and its impact on user privacy. This research investigates deceptive designs in privacy communication and interaction mechanisms of 12 top-rated VR games and applications through autoethnographic evaluation of the applications and thematic analysis of privacy policies. We found that while many deceptive designs rely on 2D interfaces, some VR-unique features, while not directly enabling deception, amplified data disclosure behaviors, and obscured actual data practices. Convoluted privacy policies and manipulative consent practices further hinder comprehension and increase privacy risks. We also observed privacy-preserving design strategies and protective considerations in VR privacy policies. We offer recommendations for ethical VR design that balance immersive experiences with strong privacy protections, guiding researchers, designers, and policymakers to improve privacy in VR environments.<\/jats:p>","DOI":"10.1145\/3757612","type":"journal-article","created":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T16:59:10Z","timestamp":1760633950000},"page":"1-54","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Immersive Invaders: Privacy Threats from Deceptive Design in Virtual Reality Games and Applications"],"prefix":"10.1145","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5911-1405","authenticated-orcid":false,"given":"Hilda","family":"Hadan","sequence":"first","affiliation":[{"name":"Stratford School of Interaction Design and Business, University of Waterloo, Waterloo, ON, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-5335-3014","authenticated-orcid":false,"given":"Michaela","family":"Valiquette","sequence":"additional","affiliation":[{"name":"Human Computer Interaction, Carleton University, Ottawa, ON, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4290-8829","authenticated-orcid":false,"given":"Lennart E.","family":"Nacke","sequence":"additional","affiliation":[{"name":"Stratford School of Interaction Design and Business, University of Waterloo, Waterloo, ON, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0756-0022","authenticated-orcid":false,"given":"Leah","family":"Zhang-Kennedy","sequence":"additional","affiliation":[{"name":"Stratford School of Interaction Design and Business, University of Waterloo, Waterloo, ON, Canada"}]}],"member":"320","published-online":{"date-parts":[[2025,10,16]]},"reference":[{"key":"e_1_2_2_1_1","volume-title":"The California Age-Appropriate Design Code Act., https:\/\/leginfo.legislature.ca.gov\/faces\/billCompareClient.xhtml?bill_id=202120220AB2273&showamends=false. Last accessed on","author":"Secretary of State of California. 2022.","year":"2025","unstructured":"Secretary of State of California. 2022. The California Age-Appropriate Design Code Act., https:\/\/leginfo.legislature.ca.gov\/faces\/billCompareClient.xhtml?bill_id=202120220AB2273&showamends=false. Last accessed on Feb 22, 2025."},{"key":"e_1_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3546155.3546691"},{"key":"e_1_2_2_3_1","volume-title":"Stacy Holman Jones, and Carolyn Ellis","author":"Adams Tony E","year":"2016","unstructured":"Tony E Adams, Stacy Holman Jones, and Carolyn Ellis. 2016. Handbook of autoethnography. Routledge, London, UK."},{"key":"e_1_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501613"},{"key":"e_1_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3462244.3479885"},{"key":"e_1_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3461778.3462086"},{"key":"e_1_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580988"},{"key":"e_1_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0038"},{"key":"e_1_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3611064"},{"key":"e_1_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2023.3336802"},{"key":"e_1_2_2_11_1","volume-title":"Deceptive patterns - user interfaces crafted to trick you. https:\/\/www.deceptive.design\/. Last accessed on","author":"Brignull Harry","year":"2023","unstructured":"Harry Brignull. 2010. Deceptive patterns - user interfaces crafted to trick you. https:\/\/www.deceptive.design\/. Last accessed on July 24, 2023."},{"volume-title":"Deceptive patterns - exposing the tricks that tech companies use to control you","author":"Brignull Harry","key":"e_1_2_2_12_1","unstructured":"Harry Brignull. 2023. Deceptive patterns - exposing the tricks that tech companies use to control you, . Testimonium Ltd, UK."},{"key":"e_1_2_2_13_1","volume-title":"Proceedings of the 1st Workshop on Novel Challenges of Safety, Security andPrivacy in Extended Reality. Association for Computing Machinery","author":"Buck Lauren","year":"2022","unstructured":"Lauren Buck and Rachel McDonnell. 2022. Security and Privacy in the Metaverse: The Threat of the Digital Human. In Proceedings of the 1st Workshop on Novel Challenges of Safety, Security andPrivacy in Extended Reality. Association for Computing Machinery, New York, NY, USA, 4 pages."},{"key":"e_1_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484536"},{"key":"e_1_2_2_15_1","volume-title":"Natural Sciences and Engineering Research Council of Canada","author":"Canadian Institutes of Health Research","year":"2024","unstructured":"Canadian Institutes of Health Research, Natural Sciences and Engineering Research Council of Canada, Social Sciences and Humanities Research Council. 2024. Tri-Council Policy Statement: Ethical Conduct for Research Involving Humans - TCPS 2 (2022). https:\/\/ethics.gc.ca\/eng\/policy-politique_tcps2-eptc2_2022.html. Last accessed on April 24, 2024."},{"key":"e_1_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.26503\/dl.v2009i1.399"},{"key":"e_1_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517529"},{"volume-title":"Thematic analysis: a practical guide","author":"Clarke Victoria","key":"e_1_2_2_18_1","unstructured":"Victoria Clarke and Virginia Braun. 2021. Thematic analysis: a practical guide. SAGE Publications Ltd, California, United States."},{"key":"e_1_2_2_19_1","unstructured":"Federal Trade Commission. 2025. Genshin Impact Game Developer Will be Banned from Selling Lootboxes to Teens Under 16 without Parental Consent Pay a $20 Million Fine to Settle FTC Charges. https:\/\/www.ftc.gov\/news-events\/news\/press-releases\/2025\/01\/genshin-impact-game-developer-will-be-banned-selling-lootboxes-teens-under-16-without-parental. Last accessed on Feb 22 2025."},{"key":"e_1_2_2_20_1","first-page":"1","volume-title":"Deliberation of the Restricted Committee No. SAN-2021-023 of","author":"Commission nationale de l'informatique et des libert\u00e9s. 2021.","year":"2021","unstructured":"Commission nationale de l'informatique et des libert\u00e9s. 2021. Deliberation of the Restricted Committee No. SAN-2021-023 of 31 December 2021 concerning GOOGLE LLC and GOOGLE IRELAND LIMITED. Technical Report. Commission nationale de l'informatique et des libert\u00e9s. 1-30 pages. https:\/\/www.cnil.fr\/sites\/cnil\/files\/atoms\/files\/deliberation_of_the_restricted_committee_no._san-2021-023_of_31_december_2021_concerning_google_llc_and_google_ireland_limited.pdf Last accessed on August 14, 2024."},{"key":"e_1_2_2_21_1","unstructured":"Competition and Markets Authority (CMA). 2022. Online choice architecture - how do we end up making decisions we don't want to make? https:\/\/competitionandmarkets.blog.gov.uk\/2022\/04\/07\/online-choice-architecture-how-do-we-end-up-making-decisions-we-dont-want\/. Last accessed on August 14 2024."},{"key":"e_1_2_2_22_1","volume-title":"Proceedings of the 1st Workshop on Novel Challenges of Safety, Security and Privacy in Extended Reality","volume":"29","author":"Cummings James J","year":"2022","unstructured":"James J Cummings and Alexis Shore. 2022. All too real: A typology of user vulnerabilities in extended reality. In Proceedings of the 1st Workshop on Novel Challenges of Safety, Security and Privacy in Extended Reality, Vol. 29. ACM, New York, USA, 3 pages."},{"key":"e_1_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-21935-2_11"},{"key":"e_1_2_2_24_1","unstructured":"Jacob Davey. 2021. Games Who Hate: An Introduction to ISD's Gaming and Extremism Series . Technical Report. Institute for Strategic Dialogue Paris."},{"key":"e_1_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2181037.2181040"},{"key":"e_1_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376600"},{"key":"e_1_2_2_27_1","volume-title":"A comparison of methods for player clustering via behavioral telemetry. arXiv preprint arXiv:1407.3950","author":"Drachen Anders","year":"2014","unstructured":"Anders Drachen, Christian Thurau, Rafet Sifa, and Christian Bauckhage. 2014. A comparison of methods for player clustering via behavioral telemetry. arXiv preprint arXiv:1407.3950, Vol. 0, 0 (2014), 1-8."},{"key":"e_1_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1177\/1329878X211041670"},{"key":"e_1_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-4769-5"},{"key":"e_1_2_2_30_1","first-page":"1","article-title":"Avatar Privacy Challenges in the Metaverse: A Comprehensive Review and Future Directions","volume":"0","author":"Eltanbouly Somaya","year":"2024","unstructured":"Somaya Eltanbouly, Osama Halabi, and Junaid Qadir. 2024. Avatar Privacy Challenges in the Metaverse: A Comprehensive Review and Future Directions. International Journal of Human-Computer Interaction, Vol. 0, 0 (2024), 1-18.","journal-title":"International Journal of Human-Computer Interaction"},{"key":"e_1_2_2_31_1","volume-title":"Council of the European Union","author":"Parliament European","year":"2022","unstructured":"European Parliament, Council of the European Union. 2022. Regulation (EU) 2022\/2065 of the European Parliament and of the Council of 19 October 2022 on a Single Market For Digital Services and amending Directive 2000\/31\/EC (Digital Services Act) (Text with EEA relevance). https:\/\/eur-lex.europa.eu\/legal-content\/EN\/ALL\/?uri=celex:32022R2065. Last accessed on December 7, 2023.."},{"key":"e_1_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106426.3106427"},{"key":"e_1_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581508"},{"key":"e_1_2_2_34_1","unstructured":"Federal Trade Commission (FTC). 2019. PrivacyCon 2019. https:\/\/www.ftc.gov\/news-events\/events\/2019\/06\/privacycon-2019 Accessed: 2024-07-24."},{"key":"e_1_2_2_35_1","unstructured":"Federal Trade Commission (FTC). 2022a. Bringing Dark Patterns to Light. Technical Report. Federal Trade Commission (FTC) Bureau of Consumer Protection."},{"key":"e_1_2_2_36_1","unstructured":"Federal Trade Commission (FTC). 2022b. Fortnite Video Game Maker Epic Games to Pay More Than Half a Billion Dollars over FTC Allegations of Privacy Violations and Unwanted Charges. https:\/\/www.ftc.gov\/news-events\/news\/press-releases\/2022\/12\/fortnite-video-game-maker-epic-games-pay-more-half-billion-dollars-over-ftc-allegations. Last accessed on Jan 6 2023.."},{"key":"e_1_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335360"},{"key":"e_1_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445148"},{"key":"e_1_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3311927.3323136"},{"key":"e_1_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517504"},{"key":"e_1_2_2_41_1","first-page":"1","volume-title":"The Benefits and Pitfalls of Engagement Rewards in Games. Proceedings of the ACM on Human-Computer Interaction","volume":"6","author":"Frommel Julian","year":"2022","unstructured":"Julian Frommel and Regan L Mandryk. 2022. Daily Quests or Daily Pests? The Benefits and Pitfalls of Engagement Rewards in Games. Proceedings of the ACM on Human-Computer Interaction, Vol. 6, CHI PLAY (2022), 1-23."},{"key":"e_1_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445411"},{"key":"e_1_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2023-0117"},{"key":"e_1_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3170427.3188686"},{"key":"e_1_2_2_45_1","volume-title":"Notifivr: Exploring interruptions and notifications in virtual reality","author":"Ghosh Sarthak","year":"2018","unstructured":"Sarthak Ghosh, Lauren Winston, Nishant Panchal, Philippe Kimura-Thollander, Jeff Hotnog, Douglas Cheong, Gabriel Reyes, and Gregory D Abowd. 2018. Notifivr: Exploring interruptions and notifications in virtual reality. IEEE transactions on visualization and computer graphics, Vol. 24, 4 (2018), 1447-1456."},{"key":"e_1_2_2_46_1","volume-title":"Technical Report. Global Privacy Enforcement Network. Last accessed on","author":"Enforcement Global Privacy","year":"2024","unstructured":"Global Privacy Enforcement Network (GPEN). 2024. GPEN Sweep 2024:''Deceptive Design Patterns'', . Technical Report. Global Privacy Enforcement Network. Last accessed on Aug 25, 2024."},{"key":"e_1_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479516"},{"key":"e_1_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174108"},{"key":"e_1_2_2_49_1","first-page":"188","volume-title":"Mapping the Landscape of Dark Patterns Scholarship: A Systematic Literature Review. In Companion Publication of the 2023 ACM Designing Interactive Systems Conference. ACM","author":"Gray Colin M","year":"2023","unstructured":"Colin M Gray, Lorena Sanchez Chamorro, Ike Obi, and Ja-Nae Duane. 2023. Mapping the Landscape of Dark Patterns Scholarship: A Systematic Literature Review. In Companion Publication of the 2023 ACM Designing Interactive Systems Conference. ACM, New York, USA, 188-193."},{"key":"e_1_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642436"},{"key":"e_1_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.33621\/jdsr.v3i1.54"},{"key":"e_1_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2598510.2598541"},{"key":"e_1_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479521"},{"key":"e_1_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3511265.3550448"},{"key":"e_1_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3659945"},{"key":"e_1_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyab025"},{"key":"e_1_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3677074"},{"key":"e_1_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chbah.2024.100095"},{"key":"e_1_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642104"},{"key":"e_1_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3665463.3678820"},{"volume-title":"ICT Systems Security and Privacy Protection, Nora Cuppens-Boulahia, Fr\u00e9d\u00e9ric Cuppens","author":"Hoepman Jaap-Henk","key":"e_1_2_2_61_1","unstructured":"Jaap-Henk Hoepman. 2014. Privacy Design Strategies. In ICT Systems Security and Privacy Protection, Nora Cuppens-Boulahia, Fr\u00e9d\u00e9ric Cuppens, Sushil Jajodia, Anas Abou El Kalam, and Thierry Sans (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 446-459."},{"key":"e_1_2_2_62_1","unstructured":"Information Commissioner's Office. 2020. Age appropriate design: a code of practice for online services. https:\/\/ico.org.uk\/media\/for-organisations\/guide-to-data-protection\/key-data-protection-themes\/age-appropriate-design-a-code-of-practice-for-online-services-2-1.pdf. Last accessed on Feb 22 2025."},{"key":"e_1_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/985692.985752"},{"key":"e_1_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3485360"},{"key":"e_1_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642355"},{"key":"e_1_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/11550.003.0019"},{"key":"e_1_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2019.07.017"},{"key":"e_1_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3611053"},{"key":"e_1_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3660340"},{"key":"e_1_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3660340"},{"key":"e_1_2_2_71_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcom.2022.100537"},{"key":"e_1_2_2_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491101.3519785"},{"key":"e_1_2_2_73_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4302-6422-4"},{"key":"e_1_2_2_74_1","first-page":"1","volume-title":"11th Privacy Enhancing Technologies Symposium. Citeseer, PETS","author":"Likarish Peter","year":"2011","unstructured":"Peter Likarish, Oliver Brdiczka, Nicholas Yee, Nicholas Ducheneaut, and Les Nelson. 2011. Demographic Profiling from MMOG Gameplay. In 11th Privacy Enhancing Technologies Symposium. Citeseer, PETS, Waterloo, Canada, 1-19."},{"key":"e_1_2_2_75_1","volume-title":"The privacy policy landscape after the GDPR. arXiv preprint arXiv:1809.08396","author":"Linden Thomas","year":"2018","unstructured":"Thomas Linden, Rishabh Khandelwal, Hamza Harkous, and Kassem Fawaz. 2018. The privacy policy landscape after the GDPR. arXiv preprint arXiv:1809.08396, Vol. 0, 0 (2018), 1-18."},{"key":"e_1_2_2_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/2513506.2513530"},{"key":"e_1_2_2_77_1","doi-asserted-by":"publisher","DOI":"10.1093\/jla\/laaa006"},{"key":"e_1_2_2_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/3429290.3429293"},{"key":"e_1_2_2_79_1","unstructured":"Maximilian Maier. 2019. Dark patterns-An end user perspective."},{"key":"e_1_2_2_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385956.3418967"},{"key":"e_1_2_2_81_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2014.6890921"},{"key":"e_1_2_2_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359183"},{"key":"e_1_2_2_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445610"},{"key":"e_1_2_2_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445610"},{"key":"e_1_2_2_85_1","doi-asserted-by":"crossref","unstructured":"Tim May Beth Perry et al. 2014. Reflexivity and the practice of qualitative research. The SAGE handbook of qualitative data analysis Vol. 109 (2014) 109-122.","DOI":"10.4135\/9781446282243.n8"},{"key":"e_1_2_2_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445253"},{"key":"e_1_2_2_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/3563657.3595964"},{"key":"e_1_2_2_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580695"},{"key":"e_1_2_2_89_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-020-74486-y"},{"key":"e_1_2_2_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/3381991.3395603"},{"key":"e_1_2_2_91_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580729"},{"key":"e_1_2_2_92_1","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2023-0108"},{"key":"e_1_2_2_93_1","doi-asserted-by":"publisher","DOI":"10.5555\/1555880.1555921"},{"key":"e_1_2_2_94_1","first-page":"119","article-title":"Privacy as contextual integrity","volume":"79","author":"Nissenbaum Helen","year":"2004","unstructured":"Helen Nissenbaum. 2004. Privacy as contextual integrity. Wash. L. Rev., Vol. 79 (2004), 119.","journal-title":"Wash. L. Rev."},{"key":"e_1_2_2_95_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376321"},{"key":"e_1_2_2_96_1","doi-asserted-by":"crossref","unstructured":"OECD. 2022. Dark commercial patterns. Technical Report 336. OECD Publishing Paris. doi:10.1787\/44f5e846-en","DOI":"10.1787\/44f5e846-en"},{"key":"e_1_2_2_97_1","unstructured":"California Secretary of State 2020. 2020. California Privacy Rights Act of 2020 (CPRA). https:\/\/leginfo.legislature.ca.gov\/faces\/codes_displayText.xhtml?division=3.&part=4.&lawCode=CIV&title=1.81.5. CPRA also known as Proposition 24 is a California ballot proposition that was approved by a majority of voters after appearing on the ballot for the general election on November 3 2020. The CPRA amends the CCPA and includes additional privacy protections for consumers. The provisions that are not yet operative are listed after the CCPA provision in effect. Last accessed on November 28 2022."},{"key":"e_1_2_2_98_1","unstructured":"Office of the Arizona Attorney General. 2022. Attorney General Mark Brnovich Achieves Historic $85 Million Settlement with Google. https:\/\/www.azag.gov\/press-release\/attorney-general-mark-brnovich-achieves-historic-85-million-settlement-google Accessed: [Insert access date here]."},{"key":"e_1_2_2_99_1","volume-title":"Guidelines for Obtaining Meaningful Consent. https:\/\/www.priv.gc.ca\/en\/privacy-topics\/collecting-personal-information\/consent\/gl_omc_201805\/. Last accessed on","author":"Office of the Privacy Commission","year":"2024","unstructured":"Office of the Privacy Commissioner of Canada. 2018. Guidelines for Obtaining Meaningful Consent. https:\/\/www.priv.gc.ca\/en\/privacy-topics\/collecting-personal-information\/consent\/gl_omc_201805\/. Last accessed on July 28, 2024."},{"key":"e_1_2_2_100_1","volume-title":"Gaming and personal information: playing with privacy. https:\/\/www.priv.gc.ca\/en\/privacy-topics\/technology\/mobile-and-digital-devices\/digital-devices\/gd_gc_201905\/. Last accessed on","author":"Office of the Privacy Commission","year":"2024","unstructured":"Office of the Privacy Commissioner of Canada. 2024a. Gaming and personal information: playing with privacy. https:\/\/www.priv.gc.ca\/en\/privacy-topics\/technology\/mobile-and-digital-devices\/digital-devices\/gd_gc_201905\/. Last accessed on July 28, 2024."},{"key":"e_1_2_2_101_1","unstructured":"Office of the Privacy Commissioner of Canada. 2024b. OPC Sweep Report 2024: Deceptive Design Patterns . Technical Report. Office of the Privacy Commissioner of Canada Ottawa Canada. https:\/\/www.priv.gc.ca"},{"key":"e_1_2_2_102_1","doi-asserted-by":"publisher","DOI":"10.1145\/3675802"},{"key":"e_1_2_2_103_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-021-04970-6"},{"key":"e_1_2_2_104_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300340"},{"key":"e_1_2_2_105_1","doi-asserted-by":"publisher","DOI":"10.1177\/15586898221126816"},{"key":"e_1_2_2_106_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0027"},{"key":"e_1_2_2_107_1","volume-title":"Designing interactive systems through a game lens: An ethnographic approach. Computers in human behavior","author":"Rapp Amon","year":"2017","unstructured":"Amon Rapp. 2017a. Designing interactive systems through a game lens: An ethnographic approach. Computers in human behavior, Vol. 71 (2017), 455-468."},{"key":"e_1_2_2_108_1","doi-asserted-by":"publisher","DOI":"10.1177\/1046878117697147"},{"key":"e_1_2_2_109_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-73374-6_3"},{"volume-title":"Trends and Innovations in Information Systems and Technologies, \u00c1lvaro Rocha, Hojjat Adeli, Lu\u00eds Paulo Reis","author":"Rauti Sampsa","key":"e_1_2_2_110_1","unstructured":"Sampsa Rauti and Samuli Laato. 2020. Location-Based Games as Interfaces for Collecting User Data. In Trends and Innovations in Information Systems and Technologies, \u00c1lvaro Rocha, Hojjat Adeli, Lu\u00eds Paulo Reis, Sandra Costanzo, Irena Orovic, and Fernando Moreira (Eds.). Springer International Publishing, Cham, 631-642."},{"key":"e_1_2_2_111_1","first-page":"61","article-title":"Privacy in gaming","volume":"29","author":"Russell N Cameron","year":"2018","unstructured":"N Cameron Russell, Joel R Reidenberg, and Sumyung Moon. 2018. Privacy in gaming. Fordham Intell. Prop. Media & Ent. LJ, Vol. 29 (2018), 61.","journal-title":"Fordham Intell. Prop. Media & Ent. LJ"},{"key":"e_1_2_2_112_1","doi-asserted-by":"publisher","DOI":"10.1145\/3311350.3347190"},{"volume-title":"The coding manual for qualitative researchers. sage","author":"Johnny Salda","key":"e_1_2_2_113_1","unstructured":"Johnny Salda na. 2021. The coding manual for qualitative researchers. sage, Thousand Oaks, CA, USA."},{"key":"e_1_2_2_114_1","volume-title":"Promoting Bright Patterns. CHI '23 Workshop: Designing Technology and Policy Simultaneously. arXiv:2304","author":"Sandhaus Hauke","year":"2023","unstructured":"Hauke Sandhaus. 2023. Promoting Bright Patterns. CHI '23 Workshop: Designing Technology and Policy Simultaneously. arXiv:2304.01157 [cs.HC]"},{"key":"e_1_2_2_115_1","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642661"},{"key":"e_1_2_2_116_1","first-page":"1","volume-title":"Eleventh Symposium On Usable Privacy and Security (SOUPS 2015","author":"Schaub Florian","year":"2015","unstructured":"Florian Schaub, Rebecca Balebako, Adam L. Durity, and Lorrie Faith Cranor. 2015. A Design Space for Effective Privacy Notices. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015). USENIX Association, Ottawa, 1-17. https:\/\/www.usenix.org\/conference\/soups2015\/proceedings\/presentation\/schaub"},{"key":"e_1_2_2_117_1","doi-asserted-by":"publisher","DOI":"10.1177\/13678779211007863"},{"key":"e_1_2_2_118_1","doi-asserted-by":"publisher","DOI":"10.1145\/3402942.3402964"},{"key":"e_1_2_2_119_1","doi-asserted-by":"publisher","DOI":"10.1609\/hcomp.v7i1.5266"},{"volume-title":"Models of bounded rationality: Empirically grounded economic reason","author":"Simon Herbert Alexander","key":"e_1_2_2_120_1","unstructured":"Herbert Alexander Simon. 1997. Models of bounded rationality: Empirically grounded economic reason. Vol. 3. MIT press, MA, USA."},{"key":"e_1_2_2_121_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419249.3420132"},{"key":"e_1_2_2_122_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300767"},{"key":"e_1_2_2_123_1","doi-asserted-by":"publisher","DOI":"10.5555\/3014629.3014661"},{"key":"e_1_2_2_124_1","volume-title":"Proceedings of the 1st Workshop on Novel Challenges of Safety, Security and Privacy in Extended Reality. Association for Computing Machinery","author":"Su Zihao","year":"2022","unstructured":"Zihao Su, Faysal Hossain Shezan, Yuan Tian, David Evans, and Seongkook Heo. 2022. Perception Hacking for 2D Cursorjacking in Virtual Reality. In Proceedings of the 1st Workshop on Novel Challenges of Safety, Security and Privacy in Extended Reality. Association for Computing Machinery, New York, NY, USA, 5 pages."},{"key":"e_1_2_2_125_1","doi-asserted-by":"publisher","DOI":"10.4135\/9781526435477"},{"volume-title":"Predicting Real World Behaviors from Virtual World Data","author":"Symborski Carl","key":"e_1_2_2_126_1","unstructured":"Carl Symborski, Gary M. Jackson, Meg Barton, Geoffrey Cranmer, Byron Raines, and Mary Magee Quinn. 2014. The Use of Social Science Methods to Predict Player Characteristics from Avatar Observations. In Predicting Real World Behaviors from Virtual World Data, Muhammad Aurangzeb Ahmad, Cuihua Shen, Jaideep Srivastava, and Noshir Contractor (Eds.). Springer International Publishing, Cham, 19-37."},{"key":"e_1_2_2_127_1","volume-title":"Nudge: Improving decisions about health, wealth, and happiness","author":"Thaler Richard H","year":"2009","unstructured":"Richard H Thaler and Cass R Sunstein. 2009. Nudge: Improving decisions about health, wealth, and happiness. Penguin, London, United Kingdom."},{"key":"e_1_2_2_128_1","volume-title":"Last Accesed on","author":"Consumer Organisation The European","year":"2024","unstructured":"The European Consumer Organisation. 2024. Monetising Play: Regulating in-game and in-app premium currencies. https:\/\/www.beuc.eu\/position-papers\/monetising-play-regulating-game-and-app-premium-currencies. Last Accesed on September 12, 2024."},{"key":"e_1_2_2_129_1","first-page":"3789","volume-title":"OVRseen: Auditing Network Traffic and Privacy Policies in Oculus VR. In 31st USENIX Security Symposium (USENIX Security 22)","author":"Trimananda Rahmadi","year":"2022","unstructured":"Rahmadi Trimananda, Hieu Le, Hao Cui, Janice Tran Ho, Anastasia Shuba, and Athina Markopoulou. 2022. OVRseen: Auditing Network Traffic and Privacy Policies in Oculus VR. In 31st USENIX Security Symposium (USENIX Security 22). USENIX Association, Boston, MA, 3789-3806. https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/trimananda"},{"key":"e_1_2_2_130_1","unstructured":"Hellen Truong and Axel Dalbard. 2022. Bright Patterns as an Ethical Approach to Counteract Dark Patterns: A Closer Investigation of The Ethics of Persuasive Design."},{"key":"e_1_2_2_131_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491101.3503577"},{"key":"e_1_2_2_132_1","unstructured":"United for Literacy. 2022. Adult Literacy Skills for Success: 2022 National Report. Technical Report. United for Literacy Canada. https:\/\/unitedforliteracy.ca"},{"key":"e_1_2_2_133_1","volume-title":"Cognitive biases, dark patterns, and the 'privacy paradox'. Current opinion in psychology","author":"Waldman Ari Ezra","year":"2020","unstructured":"Ari Ezra Waldman. 2020. Cognitive biases, dark patterns, and the 'privacy paradox'. Current opinion in psychology, Vol. 31 (2020), 105-109."},{"key":"e_1_2_2_134_1","doi-asserted-by":"publisher","DOI":"10.1145\/3476078"},{"key":"e_1_2_2_135_1","volume-title":"Foundations of Digital Games","author":"Zagal Jos\u00e9 P","year":"2013","unstructured":"Jos\u00e9 P Zagal, Staffan Bj\u00f6rk, and Chris Lewis. 2013. Dark patterns in the design of games. In Foundations of Digital Games 2013. ACM, Crete, Greece, 8 pages."},{"key":"e_1_2_2_136_1","doi-asserted-by":"publisher","DOI":"10.1145\/3170427.3188505"},{"key":"e_1_2_2_137_1","doi-asserted-by":"publisher","DOI":"10.1145\/3637374"},{"key":"e_1_2_2_138_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2019-0037"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3757612","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T01:52:37Z","timestamp":1760665957000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3757612"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,16]]},"references-count":138,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2025,10,18]]}},"alternative-id":["10.1145\/3757612"],"URL":"https:\/\/doi.org\/10.1145\/3757612","relation":{},"ISSN":["2573-0142"],"issn-type":[{"type":"electronic","value":"2573-0142"}],"subject":[],"published":{"date-parts":[[2025,10,16]]},"assertion":[{"value":"2025-10-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}