{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T07:57:52Z","timestamp":1776931072790,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":79,"publisher":"ACM","funder":[{"name":"Ministry of Science and ICT (MSIT), Korea","award":["Establishing the foundation of AI Trustworthiness (TTA)"],"award-info":[{"award-number":["Establishing the foundation of AI Trustworthiness (TTA)"]}]},{"name":"Institute of Information & Communications Technology Planning & Evaluation (IITP)","award":["RS-2020-II201373"],"award-info":[{"award-number":["RS-2020-II201373"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2026,4,13]]},"DOI":"10.1145\/3772318.3791188","type":"proceedings-article","created":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T06:44:11Z","timestamp":1776062651000},"page":"1-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["\"Can LLMs Persuade Humans with Deception?\": From a Deceptive Strategy Taxonomy to a Large-Scale Empirical Study"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-9458-0906","authenticated-orcid":false,"given":"Haein","family":"Yeo","sequence":"first","affiliation":[{"name":"Department of Artificial Intelligence, Hanyang University, Seoul, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0542-2793","authenticated-orcid":false,"given":"Seungwan","family":"Jin","sequence":"additional","affiliation":[{"name":"Department of Data Science, Hanyang University, Seoul, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1449-510X","authenticated-orcid":false,"given":"Taehyung","family":"Noh","sequence":"additional","affiliation":[{"name":"Department of Artificial Intelligence, Hanyang University, Seoul, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0584-6545","authenticated-orcid":false,"given":"Yejin","family":"Shin","sequence":"additional","affiliation":[{"name":"Telecommunications Technology Association, Seongnam, Gyeonggi, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-0756-9191","authenticated-orcid":false,"given":"Sangyeon","family":"Kang","sequence":"additional","affiliation":[{"name":"Telecommunications Technology Association, Seongnam, Gyeonggi, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-3978-3372","authenticated-orcid":false,"given":"Sangwoo","family":"Heo","sequence":"additional","affiliation":[{"name":"Naver, Seongnam, Gyeonggi, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-1034-3404","authenticated-orcid":false,"given":"Jiwon","family":"Chung","sequence":"additional","affiliation":[{"name":"Naver, Seongnam, Gyeonggi, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-7382-0898","authenticated-orcid":false,"given":"Hwarim","family":"Hyun","sequence":"additional","affiliation":[{"name":"Naver, Seongnam, Gyeonggi, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5535-0081","authenticated-orcid":false,"given":"Kyungsik","family":"Han","sequence":"additional","affiliation":[{"name":"Department of Data Science, Hanyang University, Seoul, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2026,4,13]]},"reference":[{"key":"e_1_3_3_3_2_2","doi-asserted-by":"crossref","unstructured":"NIST AI. 2023. Artificial intelligence risk management framework (AI RMF 1.0). URL: https:\/\/nvlpubs.nist.gov\/nistpubs\/ai\/nist.ai (2023) 100\u20131.","DOI":"10.6028\/NIST.AI.100-1.jpn"},{"key":"e_1_3_3_3_3_2","volume-title":"A taxonomy for learning, teaching, and assessing: A revision of Bloom\u2019s taxonomy of educational objectives: complete edition","author":"Anderson Lorin\u00a0W","year":"2001","unstructured":"Lorin\u00a0W Anderson and David\u00a0R Krathwohl. 2001. A taxonomy for learning, teaching, and assessing: A revision of Bloom\u2019s taxonomy of educational objectives: complete edition. Addison Wesley Longman, Inc."},{"key":"e_1_3_3_3_4_2","volume-title":"System Card: Claude Opus 4 & Claude Sonnet 4","year":"2025","unstructured":"Anthropic. 2025. System Card: Claude Opus 4 & Claude Sonnet 4. Technical Report. Anthropic. https:\/\/www-cdn.anthropic.com\/4263b940cabb546aa0e3283f35b686f4f3b2ff47.pdf"},{"key":"e_1_3_3_3_5_2","doi-asserted-by":"crossref","unstructured":"Hui Bai Jan\u00a0G Voelkel Shane Muldowney Johannes\u00a0C Eichstaedt and Robb Willer. 2025. LLM-generated messages can persuade humans on policy issues. Nature Communications 16 1 (2025) 6037.","DOI":"10.1038\/s41467-025-61345-5"},{"key":"e_1_3_3_3_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/3442188.3445922"},{"key":"e_1_3_3_3_7_2","doi-asserted-by":"crossref","unstructured":"Nattapat Boonprakong Saumya Pareek Benjamin Tag Jorge Goncalves and Tilman Dingler. 2025. Assessing Susceptibility Factors of Confirmation Bias in News Feed Reading. (2025).","DOI":"10.1145\/3706598.3713873"},{"key":"e_1_3_3_3_8_2","doi-asserted-by":"crossref","unstructured":"Mariana\u00a0Gomes Borges Claiton\u00a0Marques Correa Diego\u00a0Moreira da Rosa Andrea Gnecco and Milene\u00a0Selbach Silveira. 2025. Can (A) I help you? Comparing human and GenAI analysis of HCI qualitative research results. Journal on Interactive Systems 16 1 (2025) 962\u2013975.","DOI":"10.5753\/jis.2025.5416"},{"key":"e_1_3_3_3_9_2","doi-asserted-by":"crossref","unstructured":"Antoine\u00a0C Braet. 1992. Ethos pathos and logos in Aristotle\u2019s Rhetoric: A re-examination. Argumentation 6 3 (1992) 307\u2013320.","DOI":"10.1007\/BF00154696"},{"key":"e_1_3_3_3_10_2","doi-asserted-by":"crossref","unstructured":"Marc Brysbaert. 2019. How many words do we read per minute? A review and meta-analysis of reading rate. Journal of memory and language 109 (2019) 104047.","DOI":"10.1016\/j.jml.2019.104047"},{"key":"e_1_3_3_3_11_2","doi-asserted-by":"crossref","unstructured":"David\u00a0B Buller and Judee\u00a0K Burgoon. 1996. Interpersonal deception theory. Communication theory 6 3 (1996) 203\u2013242.","DOI":"10.1111\/j.1468-2885.1996.tb00127.x"},{"key":"e_1_3_3_3_12_2","unstructured":"Matthew Burtell and Thomas Woodside. 2023. Artificial influence: An analysis of AI-driven persuasion. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2303.08721 (2023)."},{"key":"e_1_3_3_3_13_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2024.hcinlp-1.3"},{"key":"e_1_3_3_3_14_2","doi-asserted-by":"crossref","unstructured":"Bobby\u00a0J Calder and Brian Sternthal. 1980. Television commercial wearout: An information processing view. Journal of Marketing Research 17 2 (1980) 173\u2013186.","DOI":"10.1177\/002224378001700202"},{"key":"e_1_3_3_3_15_2","unstructured":"Carlos Carrasco-Farre. 2024. Large language models are as persuasive as humans but how? About the cognitive effort and moral-emotional language of LLM arguments. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2404.09329 (2024)."},{"key":"e_1_3_3_3_16_2","volume-title":"Influence: Science and practice","author":"Cialdini Robert\u00a0B","year":"2009","unstructured":"Robert\u00a0B Cialdini et\u00a0al. 2009. Influence: Science and practice. Vol.\u00a04. Pearson education Boston."},{"key":"e_1_3_3_3_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/3706598.3713408"},{"key":"e_1_3_3_3_18_2","doi-asserted-by":"crossref","unstructured":"Zhichen Dong Zhanhui Zhou Chao Yang Jing Shao and Yu Qiao. 2024. Attacks defenses and evaluations for llm conversation safety: A survey. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2402.09283 (2024).","DOI":"10.18653\/v1\/2024.naacl-long.375"},{"key":"e_1_3_3_3_19_2","volume-title":"Measuring the Persuasiveness of Language Models","author":"Durmus Esin","year":"2024","unstructured":"Esin Durmus, Liane Lovitt, Alex Tamkin, Stuart Ritchie, Jack Clark, and Deep Ganguli. 2024. Measuring the Persuasiveness of Language Models. https:\/\/www.anthropic.com\/news\/measuring-model-persuasiveness"},{"key":"e_1_3_3_3_20_2","doi-asserted-by":"crossref","unstructured":"Nicole\u00a0B Ellison Penny Tri\u1ec7u Sarita Schoenebeck Robin Brewer and Aarti Israni. 2020. Why we don\u2019t click: Interrogating the relationship between viewing and clicking in social media contexts by exploring the \u201cnon-click\u201d. Journal of Computer-Mediated Communication 25 6 (2020) 402\u2013426.","DOI":"10.1093\/jcmc\/zmaa013"},{"key":"e_1_3_3_3_21_2","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v16i1.19283"},{"key":"e_1_3_3_3_22_2","unstructured":"European Union. 2024. Artificial Intelligence Act. Regulation (EU) 2024\/1689 of the European Parliament and of the Council of 13 June 2024."},{"key":"e_1_3_3_3_23_2","doi-asserted-by":"crossref","unstructured":"Franz Faul Edgar Erdfelder Albert-Georg Lang and Axel Buchner. 2007. G*Power 3: A flexible statistical power analysis program for the social behavioral and biomedical sciences. Behavior Research Methods 39 2 (2007) 175\u2013191.","DOI":"10.3758\/BF03193146"},{"key":"e_1_3_3_3_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174108"},{"key":"e_1_3_3_3_25_2","unstructured":"Ryan Greenblatt Carson Denison Benjamin Wright Fabien Roger Monte MacDiarmid Sam Marks Johannes Treutlein Tim Belonax Jack Chen David Duvenaud et\u00a0al. 2024. Alignment faking in large language models. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2412.14093 (2024)."},{"key":"e_1_3_3_3_26_2","volume-title":"Anthropic Education Report: How University Students Use Claude","author":"Handa Kunal","year":"2025","unstructured":"Kunal Handa, Drew Bent, Alex Tamkin, Miles McCain, Esin Durmus, Michael Stern, Mike Schiraldi, Saffron Huang, Stuart Ritchie, Steven Syverud, Kamya Jagadish, Margaret Vo, Matt Bell, and Deep Ganguli. 2025. Anthropic Education Report: How University Students Use Claude. https:\/\/www.anthropic.com\/news\/anthropic-education-report-how-university-students-use-claude"},{"key":"e_1_3_3_3_27_2","unstructured":"Dan Hendrycks Mantas Mazeika and Thomas Woodside. 2023. An overview of catastrophic AI risks. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2306.12001 (2023)."},{"key":"e_1_3_3_3_28_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.accfor.2012.02.003"},{"key":"e_1_3_3_3_29_2","unstructured":"Betty\u00a0Li Hou Kejian Shi Jason Phang James Aung Steven Adler and Rosie Campbell. 2024. Large language models as misleading assistants in conversation. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2407.11789 (2024)."},{"key":"e_1_3_3_3_30_2","doi-asserted-by":"crossref","unstructured":"Chaohua Huang Shaoshuang Zhuang Ziyuan Li and Jingke Gao. 2022. Creating a sincere sustainable brand: the application of Aristotle\u2019s rhetorical theory to green brand storytelling. Frontiers in Psychology 13 (2022) 897281.","DOI":"10.3389\/fpsyg.2022.897281"},{"key":"e_1_3_3_3_31_2","unstructured":"Saffron Huang Esin Durmus Miles McCain Kunal Handa Alex Tamkin Jerry Hong Michael Stern Arushi Somani Xiuruo Zhang and Deep Ganguli. 2025. Values in the wild: Discovering and analyzing values in real-world language model interactions. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2504.15236 (2025)."},{"key":"e_1_3_3_3_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581196"},{"key":"e_1_3_3_3_33_2","doi-asserted-by":"crossref","unstructured":"Ziwei Ji Nayeon Lee Rita Frieske Tiezheng Yu Dan Su Yan Xu Etsuko Ishii Ye\u00a0Jin Bang Andrea Madotto and Pascale Fung. 2023. Survey of hallucination in natural language generation. ACM computing surveys 55 12 (2023) 1\u201338.","DOI":"10.1145\/3571730"},{"key":"e_1_3_3_3_34_2","unstructured":"Cameron\u00a0R Jones and Benjamin\u00a0K Bergen. 2024. Lies damned lies and distributional language statistics: Persuasion and deception with large language models. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2412.17128 (2024)."},{"key":"e_1_3_3_3_35_2","doi-asserted-by":"crossref","unstructured":"Elise Karinshak Sunny\u00a0Xun Liu Joon\u00a0Sung Park and Jeffrey\u00a0T Hancock. 2023. Working with AI to persuade: Examining a large language model\u2019s ability to generate pro-vaccination messages. Proceedings of the ACM on Human-Computer Interaction 7 CSCW1 (2023) 1\u201329.","DOI":"10.1145\/3579592"},{"key":"e_1_3_3_3_36_2","doi-asserted-by":"publisher","DOI":"10.1145\/3706598.3714020"},{"key":"e_1_3_3_3_37_2","doi-asserted-by":"crossref","unstructured":"Klaus Krippendorff. 2004. Reliability in content analysis: Some common misconceptions and recommendations. Human communication research 30 3 (2004) 411\u2013433.","DOI":"10.1093\/hcr\/30.3.411"},{"key":"e_1_3_3_3_38_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613905.3647957"},{"key":"e_1_3_3_3_39_2","unstructured":"Jiarui Liu Yueqi Song Yunze Xiao Mingqian Zheng Lindia Tjuatja Jana\u00a0Schaich Borg Mona Diab and Maarten Sap. 2025. Synthetic Socratic Debates: Examining Persona Effects on Moral Decision and Persuasion Dynamics. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2506.12657 (2025)."},{"key":"e_1_3_3_3_40_2","unstructured":"Minqian Liu Zhiyang Xu Xinyi Zhang Heajun An Sarvech Qadir Qi Zhang Pamela\u00a0J Wisniewski Jin-Hee Cho Sang\u00a0Won Lee Ruoxi Jia et\u00a0al. 2025. LLM can be a dangerous persuader: Empirical study of persuasion safety in large language models. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2504.10430 (2025)."},{"key":"e_1_3_3_3_41_2","doi-asserted-by":"crossref","unstructured":"Charles\u00a0G Lord Lee Ross and Mark\u00a0R Lepper. 1979. Biased assimilation and attitude polarization: The effects of prior theories on subsequently considered evidence. Journal of personality and social psychology 37 11 (1979) 2098.","DOI":"10.1037\/0022-3514.37.11.2098"},{"key":"e_1_3_3_3_42_2","doi-asserted-by":"crossref","unstructured":"Arunesh Mathur Gunes Acar Michael\u00a0J Friedman Eli Lucherini Jonathan Mayer Marshini Chetty and Arvind Narayanan. 2019. Dark patterns at scale: Findings from a crawl of 11K shopping websites. Proceedings of the ACM on human-computer interaction 3 CSCW (2019) 1\u201332.","DOI":"10.1145\/3359183"},{"key":"e_1_3_3_3_43_2","doi-asserted-by":"crossref","unstructured":"Roger\u00a0C Mayer James\u00a0H Davis and F\u00a0David Schoorman. 1995. An integrative model of organizational trust. Academy of management review 20 3 (1995) 709\u2013734.","DOI":"10.2307\/258792"},{"key":"e_1_3_3_3_44_2","doi-asserted-by":"crossref","unstructured":"Steven\u00a0A McCornack. 1992. Information manipulation theory. Communications Monographs 59 1 (1992) 1\u201316.","DOI":"10.1080\/03637759209376245"},{"key":"e_1_3_3_3_45_2","doi-asserted-by":"crossref","unstructured":"Nora McDonald Sarita Schoenebeck and Andrea Forte. 2019. Reliability and inter-rater reliability in qualitative research: Norms and guidelines for CSCW and HCI practice. Proceedings of the ACM on human-computer interaction 3 CSCW (2019) 1\u201323.","DOI":"10.1145\/3359174"},{"key":"e_1_3_3_3_46_2","doi-asserted-by":"crossref","unstructured":"Stanley Milgram. 1963. Behavioral study of obedience. The Journal of abnormal and social psychology 67 4 (1963) 371.","DOI":"10.1037\/h0040525"},{"key":"e_1_3_3_3_47_2","doi-asserted-by":"crossref","unstructured":"Brendan Nyhan and Jason Reifler. 2010. When corrections fail: The persistence of political misperceptions. Political Behavior 32 2 (2010) 303\u2013330.","DOI":"10.1007\/s11109-010-9112-2"},{"key":"e_1_3_3_3_48_2","doi-asserted-by":"crossref","unstructured":"Jemma\u00a0Helen Oeppen\u00a0Hill. 2020. Logos ethos pathos and the marketing of higher education. Journal of Marketing for Higher Education 30 1 (2020) 87\u2013104.","DOI":"10.1080\/08841241.2019.1683120"},{"key":"e_1_3_3_3_49_2","doi-asserted-by":"crossref","unstructured":"Peter\u00a0S Park Simon Goldstein Aidan O\u2019Gara Michael Chen and Dan Hendrycks. 2024. AI deception: A survey of examples risks and potential solutions. Patterns 5 5 (2024).","DOI":"10.1016\/j.patter.2024.100988"},{"key":"e_1_3_3_3_50_2","doi-asserted-by":"crossref","unstructured":"H\u00a0Desmond Patterson and Robin Thompson. 1971. Recovery of inter-block information when block sizes are unequal. Biometrika 58 3 (1971) 545\u2013554.","DOI":"10.1093\/biomet\/58.3.545"},{"key":"e_1_3_3_3_51_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.findings-acl.847"},{"key":"e_1_3_3_3_52_2","doi-asserted-by":"crossref","unstructured":"Alberto Purpura Sahil Wadhwa Jesse Zymet Akshay Gupta Andy Luo Melissa\u00a0Kazemi Rad Swapnil Shinde and Mohammad\u00a0Shahed Sorower. 2025. Building Safe GenAI Applications: An End-to-End Overview of Red Teaming for Large Language Models. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2503.01742 (2025).","DOI":"10.18653\/v1\/2025.trustnlp-main.23"},{"key":"e_1_3_3_3_53_2","unstructured":"Alexander Rogiers Sander Noels Maarten Buyl and Tijl De\u00a0Bie. 2024. Persuasion with large language models: a survey. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2411.06837 (2024)."},{"key":"e_1_3_3_3_54_2","doi-asserted-by":"crossref","unstructured":"Jon Roozenbeek and Sander Van\u00a0der Linden. 2019. Fake news game confers psychological resistance against online misinformation. Palgrave Communications 5 1 (2019) 1\u201310.","DOI":"10.1057\/s41599-019-0279-9"},{"key":"e_1_3_3_3_55_2","doi-asserted-by":"crossref","unstructured":"Francesco Salvi Manoel Horta\u00a0Ribeiro Riccardo Gallotti and Robert West. 2025. On the conversational persuasiveness of GPT-4. Nature Human Behaviour (2025) 1\u20139.","DOI":"10.1038\/s41562-025-02194-6"},{"key":"e_1_3_3_3_56_2","doi-asserted-by":"crossref","unstructured":"Franklin\u00a0E Satterthwaite. 1946. An approximate distribution of estimates of variance components. Biometrics bulletin 2 6 (1946) 110\u2013114.","DOI":"10.2307\/3002019"},{"key":"e_1_3_3_3_57_2","unstructured":"Philipp Schoenegger Francesco Salvi Jiacheng Liu Xiaoli Nan Ramit Debnath Barbara Fasolo Evelina Leivada Gabriel Recchia Fritz G\u00fcnther Ali Zarifhonarvar et\u00a0al. 2025. Large Language Models Are More Persuasive Than Incentivized Human Persuaders. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2505.09662 (2025)."},{"key":"e_1_3_3_3_58_2","unstructured":"Chirag Shah Ryen White Reid Andersen Georg Buscher Scott Counts Sarkar Das Ali Montazer Sathish Manivannan Jennifer Neville Nagu Rangan et\u00a0al. 2023. Using large language models to generate validate and apply user intent taxonomies. ACM Transactions on the Web (2023)."},{"key":"e_1_3_3_3_59_2","unstructured":"Mrinank Sharma Meg Tong Tomasz Korbak David Duvenaud Amanda Askell Samuel\u00a0R Bowman Newton Cheng Esin Durmus Zac Hatfield-Dodds Scott\u00a0R Johnston et\u00a0al. 2023. Towards understanding sycophancy in language models. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2310.13548 (2023)."},{"key":"e_1_3_3_3_60_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642459"},{"key":"e_1_3_3_3_61_2","unstructured":"Toby Shevlane Sebastian Farquhar Ben Garfinkel Mary Phuong Jess Whittlestone Jade Leung Daniel Kokotajlo Nahema Marchal Markus Anderljung Noam Kolt et\u00a0al. 2023. Model evaluation for extreme risks. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2305.15324 (2023)."},{"key":"e_1_3_3_3_62_2","doi-asserted-by":"crossref","unstructured":"Matthias Stadler Maria Bannert and Michael Sailer. 2024. Cognitive ease at a cost: LLMs reduce mental effort but compromise depth in student scientific inquiry. Computers in Human Behavior 160 (2024) 108386.","DOI":"10.1016\/j.chb.2024.108386"},{"key":"e_1_3_3_3_63_2","doi-asserted-by":"crossref","unstructured":"Christina Steindl Eva Jonas Sandra Sittenthaler Eva Traut-Mattausch and Jeff Greenberg. 2015. Understanding psychological reactance. Zeitschrift f\u00fcr Psychologie (2015).","DOI":"10.1027\/2151-2604\/a000222"},{"key":"e_1_3_3_3_64_2","unstructured":"Xin Sun Rongjun Ma Xiaochang Zhao Zhuying Li Janne Lindqvist Abdallah\u00a0El Ali and Jos\u00a0A Bosch. 2024. Trusting the search: unraveling human trust in health information from Google and ChatGPT. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2403.09987 (2024)."},{"key":"e_1_3_3_3_65_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300768"},{"key":"e_1_3_3_3_66_2","doi-asserted-by":"crossref","unstructured":"Charles\u00a0S Taber and Milton Lodge. 2006. Motivated skepticism in the evaluation of political beliefs. American journal of political science 50 3 (2006) 755\u2013769.","DOI":"10.1111\/j.1540-5907.2006.00214.x"},{"key":"e_1_3_3_3_67_2","doi-asserted-by":"publisher","DOI":"10.1145\/3706598.3714243"},{"key":"e_1_3_3_3_68_2","unstructured":"Christian Tarsney. 2025. Deception and manipulation in generative AI. Philosophical Studies (2025) 1\u201323."},{"key":"e_1_3_3_3_69_2","doi-asserted-by":"crossref","unstructured":"Gerard\u00a0J Tellis. 1997. Effective frequency: one exposure or three factors? Journal of Advertising research 37 4 (1997) 75\u201380.","DOI":"10.1080\/00218499.1997.12466688"},{"key":"e_1_3_3_3_70_2","doi-asserted-by":"publisher","DOI":"10.1145\/3657604.3664700"},{"key":"e_1_3_3_3_71_2","doi-asserted-by":"crossref","unstructured":"Maggie\u00a0E Toplak Richard\u00a0F West and Keith\u00a0E Stanovich. 2014. Assessing miserly information processing: An expansion of the Cognitive Reflection Test. Thinking & reasoning 20 2 (2014) 147\u2013168.","DOI":"10.1080\/13546783.2013.844729"},{"key":"e_1_3_3_3_72_2","doi-asserted-by":"crossref","unstructured":"Sander Van Der\u00a0Linden. 2022. Misinformation: susceptibility spread and interventions to immunize the public. Nature medicine 28 3 (2022) 460\u2013467.","DOI":"10.1038\/s41591-022-01713-6"},{"key":"e_1_3_3_3_73_2","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v19i1.35916"},{"key":"e_1_3_3_3_74_2","doi-asserted-by":"publisher","DOI":"10.1145\/3531146.3533088"},{"key":"e_1_3_3_3_75_2","doi-asserted-by":"crossref","unstructured":"Bernard\u00a0L Welch. 1947. The generalization of \u2018STUDENT\u2019S\u2019problem when several different population varlances are involved. Biometrika 34 1-2 (1947) 28\u201335.","DOI":"10.1093\/biomet\/34.1-2.28"},{"key":"e_1_3_3_3_76_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613905.3650732"},{"key":"e_1_3_3_3_77_2","doi-asserted-by":"publisher","DOI":"10.1145\/3706598.3713770"},{"key":"e_1_3_3_3_78_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613905.3650867"},{"key":"e_1_3_3_3_79_2","doi-asserted-by":"crossref","unstructured":"Xiao Zhan Yifan Xu Noura Abdi Joe Collenette Ruba Abu-Salma and Stefan Sarkadi. 2024. Banal Deception Human-AI Ecosystems: A Study of People\u2019s Perceptions of LLM-generated Deceptive Behaviour. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2406.08386 (2024).","DOI":"10.1613\/jair.1.18724"},{"key":"e_1_3_3_3_80_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581318"}],"event":{"name":"CHI 2026: CHI Conference on Human Factors in Computing Systems","location":"Barcelona Spain","acronym":"CHI '26","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2026 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3772318.3791188","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T08:20:21Z","timestamp":1776068421000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3772318.3791188"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4,13]]},"references-count":79,"alternative-id":["10.1145\/3772318.3791188","10.1145\/3772318"],"URL":"https:\/\/doi.org\/10.1145\/3772318.3791188","relation":{},"subject":[],"published":{"date-parts":[[2026,4,13]]},"assertion":[{"value":"2026-04-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}