{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T07:56:32Z","timestamp":1776930992005,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":94,"publisher":"ACM","license":[{"start":{"date-parts":[[2027,4,13]],"date-time":"2027-04-13T00:00:00Z","timestamp":1807574400000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CNS-2426395"],"award-info":[{"award-number":["CNS-2426395"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CMMI-2326378"],"award-info":[{"award-number":["CMMI-2326378"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CNS-2341187"],"award-info":[{"award-number":["CNS-2341187"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CNS-2426397"],"award-info":[{"award-number":["CNS-2426397"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CNS-2442221"],"award-info":[{"award-number":["CNS-2442221"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CNS-2426396"],"award-info":[{"award-number":["CNS-2426396"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"Adobe Systems","doi-asserted-by":"publisher","award":["Research Gift"],"award-info":[{"award-number":["Research Gift"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006785","name":"Google","doi-asserted-by":"publisher","award":["Google PSS Faculty Award"],"award-info":[{"award-number":["Google PSS Faculty Award"]}],"id":[{"id":"10.13039\/100006785","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006785","name":"Google","doi-asserted-by":"publisher","award":["Google Research Scholar Award"],"award-info":[{"award-number":["Google Research Scholar Award"]}],"id":[{"id":"10.13039\/100006785","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100007065","name":"Nvidia","doi-asserted-by":"publisher","award":["NVIDIA Academic Hardware Grant"],"award-info":[{"award-number":["NVIDIA Academic Hardware Grant"]}],"id":[{"id":"10.13039\/100007065","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Schmidt Sciences","award":["Trustworthy AI Award"],"award-info":[{"award-number":["Trustworthy AI Award"]}]},{"DOI":"10.13039\/100001451","name":"Amazon","doi-asserted-by":"publisher","award":["AI2AI Award"],"award-info":[{"award-number":["AI2AI Award"]}],"id":[{"id":"10.13039\/100001451","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2026,4,13]]},"DOI":"10.1145\/3772318.3791568","type":"proceedings-article","created":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T06:44:21Z","timestamp":1776062661000},"page":"1-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Dark Patterns Meet GUI Agents: LLM Agent Susceptibility to Manipulative Interfaces and the Role of Human Oversight"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-8259-8531","authenticated-orcid":false,"given":"Jingyu","family":"Tang","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, University of Notre Dame, Notre Dame, Indiana, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9161-4088","authenticated-orcid":false,"given":"Chaoran","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, University of Notre Dame, Notre Dame, Indiana, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-6906-225X","authenticated-orcid":false,"given":"Jiawen","family":"Li","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, Michigan, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6794-0054","authenticated-orcid":false,"given":"Zhiping","family":"Zhang","sequence":"additional","affiliation":[{"name":"Khoury College of Computer Sciences, Northeastern University, Boston, Massachusetts, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9001-8727","authenticated-orcid":false,"given":"Bingcan","family":"Guo","sequence":"additional","affiliation":[{"name":"Department of Human Centered Design &amp; Engineering, University of Washington, Seattle, Washington, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-6882-1431","authenticated-orcid":false,"given":"Ibrahim","family":"Khalilov","sequence":"additional","affiliation":[{"name":"Johns Hopkins University, Baltimore, Maryland, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1772-6065","authenticated-orcid":false,"given":"Simret Araya","family":"Gebreegziabher","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, University of Notre Dame, Notre Dame, Indiana, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-8329-4610","authenticated-orcid":false,"given":"Bingsheng","family":"Yao","sequence":"additional","affiliation":[{"name":"Northeastern University, Boston, Massachusetts, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9371-9441","authenticated-orcid":false,"given":"Dakuo","family":"Wang","sequence":"additional","affiliation":[{"name":"Northeastern University, Boston, Massachusetts, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-6002-125X","authenticated-orcid":false,"given":"Yanfang","family":"Ye","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, University of Notre Dame, Notre Dame, Indiana, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0877-5727","authenticated-orcid":false,"given":"Tianshi","family":"Li","sequence":"additional","affiliation":[{"name":"Northeastern University, Boston, Massachusetts, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3368-0180","authenticated-orcid":false,"given":"Ziang","family":"Xiao","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Johns Hopkins University, Baltimore, Maryland, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-7900-9265","authenticated-orcid":false,"given":"Yaxing","family":"Yao","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Johns Hopkins University, Baltimore, Maryland, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7902-7625","authenticated-orcid":false,"given":"Toby Jia-Jun","family":"Li","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, University of Notre Dame, Notre Dame, Indiana, USA"}]}],"member":"320","published-online":{"date-parts":[[2026,4,13]]},"reference":[{"key":"e_1_3_3_2_2_2","volume-title":"Deceptive Design - Types of Deceptive Design","year":"2010","unstructured":"2010. Deceptive Design - Types of Deceptive Design. http:\/\/web.archive.org\/web\/20220525230009\/https:\/\/www.deceptive.design\/types Archived version."},{"key":"e_1_3_3_2_3_2","unstructured":"2025. Manus AI. https:\/\/www.manusai.io\/. [Accessed 08-09-2025]."},{"key":"e_1_3_3_2_4_2","unstructured":"2025. OpenAI launches Operator an AI agent that performs tasks autonomously. https:\/\/techcrunch.com\/2025\/01\/23\/openai-launches-operator-an-ai-agent-that-performs-tasks-autonomously. 2025-01-23."},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491101.3519837"},{"key":"e_1_3_3_2_6_2","volume-title":"Computer Use Tool","year":"2025","unstructured":"Anthropic. 2025. Computer Use Tool. https:\/\/platform.claude.com\/docs\/en\/agents-and-tools\/tool-use\/computer-use-tool"},{"key":"e_1_3_3_2_7_2","first-page":"2813","volume-title":"33rd USENIX Security Symposium (USENIX Security 24)","author":"Bielova Nataliia","year":"2024","unstructured":"Nataliia Bielova, Laura Litvine, Anysia Nguyen, Mariam Chammat, Vincent Toubiana, and Estelle Hary. 2024. The Effect of Design Patterns on (Present and Future) Cookie Consent Decisions. In 33rd USENIX Security Symposium (USENIX Security 24). USENIX Association, Philadelphia, PA, 2813\u20132830. https:\/\/www.usenix.org\/conference\/usenixsecurity24\/presentation\/bielova"},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/3461778.3462086"},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/3461778.3462086"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"publisher","unstructured":"Christoph B\u00f6sch Benjamin Erb Frank Kargl Henning Kopp and Stefan Pfattheicher. 2016. Tales from the Dark Side: Privacy Dark Strategies and Privacy Dark Patterns. Proceedings on Privacy Enhancing Technologies 2016 (2016) 237 \u2013 254. 10.1515\/popets-2016-0038","DOI":"10.1515\/popets-2016-0038"},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642781"},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/2559636.2559677"},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"publisher","unstructured":"Chaoran Chen Zhiping Zhang Bingcan Guo Shang Ma Ibrahim Khalilov Simret\u00a0Araya Gebreegziabher Yanfang Ye Ziang Xiao Yaxing Yao Tianshi Li and Toby Jia-Jun Li. 2025. The Obvious Invisible Threat: LLM-Powered GUI Agents\u2019 Vulnerability to Fine-Print Injections. ArXiv abs\/2504.11281 (2025). 10.48550\/arXiv.2504.11281","DOI":"10.48550\/arXiv.2504.11281"},{"key":"e_1_3_3_2_14_2","unstructured":"Chaoran Chen Zhiping Zhang Ibrahim Khalilov Bingcan Guo Simret\u00a0A Gebreegziabher Yanfang Ye Ziang Xiao Yaxing Yao Tianshi Li and Toby Jia-Jun Li. 2025. Toward a human-centered evaluation framework for trustworthy llm-powered gui agents. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2504.17934 (2025)."},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/3708359.3712156"},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"publisher","unstructured":"Yanda Chen Joe Benton Ansh Radhakrishnan Jonathan Uesato Carson Denison John Schulman Arushi Somani Peter Hase Misha Wagner Fabien Roger et\u00a0al. 2025. Reasoning Models Don\u2019t Always Say What They Think. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2505.05410 (2025). 10.48550\/arXiv.2505.05410","DOI":"10.48550\/arXiv.2505.05410"},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2025.findings-acl.348"},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"crossref","unstructured":"Inyoung Cheong. 2025. Epistemic and Emotional Harms of Generative AI: Towards Human-Centered First Amendment. (2 Sept. 2025). https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=5435335 Preprint posted on SSRN; 71 pages.","DOI":"10.2139\/ssrn.5435335"},{"key":"e_1_3_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517500"},{"key":"e_1_3_3_2_20_2","unstructured":"Katherine\u00a0M Collins Catherine Wong Jiahai Feng Megan Wei and Joshua\u00a0B Tenenbaum. 2022. Structured flexible and robust: benchmarking and improving large language models towards more human-like behavior in out-of-distribution reasoning tasks. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2205.05718 (2022)."},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376600"},{"key":"e_1_3_3_2_22_2","unstructured":"European Data Protection Board. 2022. Guidelines 3\/2022 on Dark patterns in social media platform interfaces: How to recognise and avoid them. Public consultation document. https:\/\/www.edpb.europa.eu\/our-work-tools\/documents\/public-consultations\/2022\/guidelines-32022-dark-patterns-social-media_en"},{"key":"e_1_3_3_2_23_2","unstructured":"European Union. 2024. Artificial Intelligence Act: Article 14 - Human Oversight. https:\/\/artificialintelligenceact.eu\/article\/14\/ Accessed: 2025-01-19."},{"key":"e_1_3_3_2_24_2","unstructured":"Ivan Evtimov Arman Zharmagambetov Aaron Grattafiori Chuan Guo and Kamalika Chaudhuri. 2025. WASP: Benchmarking Web Agent Security Against Prompt Injection Attacks. ArXiv abs\/2504.18575 (2025). https:\/\/api.semanticscholar.org\/CorpusID:278166059"},{"key":"e_1_3_3_2_25_2","unstructured":"Cedric Faas Richard Bergs Sarah Sterz Markus Langer and Anna\u00a0Maria Feit. 2024. Give Me a Choice: The Consequences of Restricting Choices Through AI-Support for Perceived Autonomy Motivational Variables and Decision Performance. arxiv:https:\/\/arXiv.org\/abs\/2410.07728\u00a0[cs.HC] https:\/\/arxiv.org\/abs\/2410.07728"},{"key":"e_1_3_3_2_26_2","unstructured":"K.\u00a0J.\u00a0Kevin Feng David\u00a0W. McDonald and Amy\u00a0X. Zhang. 2025. Levels of Autonomy for AI Agents. arxiv:https:\/\/arXiv.org\/abs\/2506.12469\u00a0[cs.HC] https:\/\/arxiv.org\/abs\/2506.12469"},{"key":"e_1_3_3_2_27_2","unstructured":"K.\u00a0J.\u00a0Kevin Feng Kevin Pu Matt Latzke Tal August Pao Siangliulue Jonathan Bragg Daniel\u00a0S. Weld Amy\u00a0X. Zhang and Joseph\u00a0Chee Chang. 2025. Cocoa: Co-Planning and Co-Execution with AI Agents. arxiv:https:\/\/arXiv.org\/abs\/2412.10999\u00a0[cs.HC] https:\/\/arxiv.org\/abs\/2412.10999"},{"key":"e_1_3_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300408"},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/3446871.3469754"},{"key":"e_1_3_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174108"},{"key":"e_1_3_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/3563703.3596635"},{"key":"e_1_3_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642436"},{"key":"e_1_3_3_2_33_2","doi-asserted-by":"publisher","unstructured":"P.\u00a0M. Groves and R.\u00a0F. Thompson. 1970. Habituation: a dual-process theory. Psychological Review 77 (1970) 419\u2013450. Issue 5. 10.1037\/h0029810","DOI":"10.1037\/h0029810"},{"key":"e_1_3_3_2_34_2","doi-asserted-by":"publisher","unstructured":"Chao Hao Shuai Wang and Kaiwen Zhou. 2025. Uncertainty-Aware GUI Agent: Adaptive Perception through Component Recommendation and Human-in-the-Loop Refinement. arxiv:https:\/\/arXiv.org\/abs\/2508.04025\u00a0[cs.AI] 10.48550\/arXiv.2508.04025","DOI":"10.48550\/arXiv.2508.04025"},{"key":"e_1_3_3_2_35_2","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780192864543.003.0008"},{"key":"e_1_3_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1145\/302979.303030"},{"key":"e_1_3_3_2_37_2","doi-asserted-by":"publisher","unstructured":"Siyuan Hu Mingyu Ouyang Difei Gao and Mike\u00a0Zheng Shou. 2024. The Dawn of GUI Agent: A Preliminary Case Study with Claude 3.5 Computer Use. arxiv:https:\/\/arXiv.org\/abs\/2411.10323\u00a0[cs.AI] 10.48550\/arXiv.2411.10323","DOI":"10.48550\/arXiv.2411.10323"},{"key":"e_1_3_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2025.naacl-demo.17"},{"key":"e_1_3_3_2_39_2","doi-asserted-by":"crossref","unstructured":"Jon\u00a0M Jachimowicz Shannon Duncan Elke\u00a0U Weber and Eric\u00a0J Johnson. 2019. When and why defaults influence decisions: A meta-analysis of default effects. Behavioural Public Policy 3 2 (2019) 159\u2013186.","DOI":"10.1017\/bpp.2018.43"},{"key":"e_1_3_3_2_40_2","series-title":"(NIPS \u201923)","volume-title":"Proceedings of the 37th International Conference on Neural Information Processing Systems","author":"Kim Geunwoo","year":"2023","unstructured":"Geunwoo Kim, Pierre Baldi, and Stephen McAleer. 2023. Language models can solve computer tasks. In Proceedings of the 37th International Conference on Neural Information Processing Systems (New Orleans, LA, USA) (NIPS \u201923). Curran Associates Inc., Red Hook, NY, USA, Article 1723, 30\u00a0pages."},{"key":"e_1_3_3_2_41_2","doi-asserted-by":"publisher","unstructured":"W.\u00a0J. Ladeira W.\u00a0M. Lim F.\u00a0d.\u00a0O. Santini T. Rasul M.\u00a0G. Perin and L. Alt\u0131nay. 2023. A meta\u2010analysis on the effects of product scarcity. Psychology & Marketing 40 (2023) 1267\u20131279. Issue 7. 10.1002\/mar.21816","DOI":"10.1002\/mar.21816"},{"key":"e_1_3_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3501999"},{"key":"e_1_3_3_2_43_2","doi-asserted-by":"publisher","DOI":"10.1145\/3379503.3403557"},{"key":"e_1_3_3_2_44_2","unstructured":"Meng Li Xiang Wang Liming Nie Chenglin Li Yang Liu Yangyang Zhao Lei Xue and Kabir\u00a0Sulaiman Said. 2024. A Comprehensive Study on Dark Patterns. ArXiv abs\/2412.09147 (2024). https:\/\/api.semanticscholar.org\/CorpusID:274656001"},{"key":"e_1_3_3_2_45_2","volume-title":"The Thirteenth International Conference on Learning Representations","author":"Liao Zeyi","year":"2025","unstructured":"Zeyi Liao, Lingbo Mo, Chejian Xu, Mintong Kang, Jiawei Zhang, Chaowei Xiao, Yuan Tian, Bo Li, and Huan Sun. 2025. EIA: ENVIRONMENTAL INJECTION ATTACK ON GENERALIST WEB AGENTS FOR PRIVACY LEAKAGE. In The Thirteenth International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=xMOLUzo2Lk"},{"key":"e_1_3_3_2_46_2","doi-asserted-by":"publisher","DOI":"10.1145\/258549.258592"},{"key":"e_1_3_3_2_47_2","unstructured":"Chris Lu Cong Lu Robert\u00a0Tjarko Lange Jakob Foerster Jeff Clune and David Ha. 2024. The AI Scientist: Towards Fully Automated Open-Ended Scientific Discovery. arxiv:https:\/\/arXiv.org\/abs\/2408.06292\u00a0[cs.AI] https:\/\/arxiv.org\/abs\/2408.06292"},{"key":"e_1_3_3_2_48_2","unstructured":"Yijie Lu Tianjie Ju Manman Zhao Xinbei Ma Yuan Guo and Zhuosheng Zhang. 2025. EVA: Red-Teaming GUI Agents via Evolving Indirect Prompt Injection. ArXiv abs\/2505.14289 (2025). https:\/\/arxiv.org\/abs\/2505.14289"},{"key":"e_1_3_3_2_49_2","unstructured":"Yadong Lu Jianwei Yang Yelong Shen and Ahmed Awadallah. 2024. OmniParser for Pure Vision Based GUI Agent. arxiv:https:\/\/arXiv.org\/abs\/2408.00203\u00a0[cs.CV] https:\/\/arxiv.org\/abs\/2408.00203"},{"key":"e_1_3_3_2_50_2","doi-asserted-by":"publisher","unstructured":"Yuwen Lu Chao Zhang Yuewen Yang Yaxing Yao and Toby Jia-Jun Li. 2024. From Awareness to Action: Exploring End-User Empowerment Interventions for Dark Patterns in UX. Proc. ACM Hum.-Comput. Interact. 8 CSCW1 Article 59 (April 2024) 41\u00a0pages. 10.1145\/3637336","DOI":"10.1145\/3637336"},{"key":"e_1_3_3_2_51_2","doi-asserted-by":"publisher","DOI":"10.1145\/1120212.1120281"},{"key":"e_1_3_3_2_52_2","doi-asserted-by":"publisher","unstructured":"Arunesh Mathur Gunes Acar Michael\u00a0J. Friedman Eli Lucherini Jonathan Mayer Marshini Chetty and Arvind Narayanan. 2019. Dark Patterns at Scale: Findings from a Crawl of 11K Shopping Websites. Proc. ACM Hum.-Comput. Interact. 3 CSCW Article 81 (Nov. 2019) 32\u00a0pages. 10.1145\/3359183","DOI":"10.1145\/3359183"},{"key":"e_1_3_3_2_53_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445610"},{"key":"e_1_3_3_2_54_2","doi-asserted-by":"crossref","unstructured":"Arunesh Mathur Arvind Narayanan and Marshini Chetty. 2018. Endorsements on Social Media. Proceedings of the ACM on Human-Computer Interaction 2 (2018) 1 \u2013 26. https:\/\/api.semanticscholar.org\/CorpusID:4317015","DOI":"10.1145\/3274388"},{"key":"e_1_3_3_2_55_2","doi-asserted-by":"publisher","unstructured":"Nora McDonald Sarita Schoenebeck and Andrea Forte. 2019. Reliability and Inter-rater Reliability in Qualitative Research: Norms and Guidelines for CSCW and HCI Practice. Proc. ACM Hum.-Comput. Interact. 3 CSCW Article 72 (Nov. 2019) 23\u00a0pages. 10.1145\/3359174","DOI":"10.1145\/3359174"},{"key":"e_1_3_3_2_56_2","doi-asserted-by":"publisher","unstructured":"Torsten L\u00a0Christensen Meryl\u00a0Brod Laura E\u00a0Tesler. 2009. Qualitative research and content validity: developing best practices based on science and experience. Quality of Life Research 18 9 (2009) 1263\u20131278. 10.1007\/s11136-009-9540-9","DOI":"10.1007\/s11136-009-9540-9"},{"key":"e_1_3_3_2_57_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642542"},{"key":"e_1_3_3_2_58_2","doi-asserted-by":"publisher","DOI":"10.1145\/3706598.3713776"},{"key":"e_1_3_3_2_59_2","doi-asserted-by":"publisher","DOI":"10.1145\/3563657.3595964"},{"key":"e_1_3_3_2_60_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411763.3451659"},{"key":"e_1_3_3_2_61_2","volume-title":"Design and Analysis of Experiments (9th ed.)","author":"Montgomery Douglas\u00a0C.","year":"2017","unstructured":"Douglas\u00a0C. Montgomery. 2017. Design and Analysis of Experiments (9th ed.). John Wiley & Sons, Hoboken, NJ."},{"key":"e_1_3_3_2_62_2","doi-asserted-by":"publisher","unstructured":"Hussein Mozannar Gagan Bansal Cheng Tan Adam Fourney Victor Dibia Jingya Chen Jack Gerrits Tyler Payne Matheus\u00a0Kunzler Maldaner Madeleine Grunde-McLaughlin Eric Zhu Griffin Bassman Jacob Alber Peter Chang Ricky Loynd Friederike Niedtner Ece Kamar Maya Murad Rafah Hosn and Saleema Amershi. 2025. Magentic-UI: Towards Human-in-the-loop Agentic Systems. CoRR abs\/2507.22358 (July 2025). 10.48550\/arXiv.2507.22358","DOI":"10.48550\/arXiv.2507.22358"},{"key":"e_1_3_3_2_63_2","volume-title":"Browser Use: Enable AI to control your browser","author":"M\u00fcller Magnus","year":"2024","unstructured":"Magnus M\u00fcller and Gregor \u017duni\u010d. 2024. Browser Use: Enable AI to control your browser. https:\/\/github.com\/browser-use\/browser-use"},{"key":"e_1_3_3_2_64_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2025.findings-acl.1158"},{"key":"e_1_3_3_2_65_2","unstructured":"Qian Niu Junyu Liu Ziqian Bi Pohsun Feng Benji Peng Keyu Chen Ming Li Lawrence\u00a0KQ Yan Yichao Zhang Caitlyn\u00a0Heqi Yin et\u00a0al. 2024. Large language models and cognitive science: A comprehensive review of similarities differences and challenges. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2409.02387 (2024)."},{"key":"e_1_3_3_2_66_2","doi-asserted-by":"publisher","unstructured":"Jantawan Noiwan and Anthony\u00a0F. Norcio. 2006. Cultural differences on attention and perceived usability: Investigating color combinations of animated graphics. International Journal of Human-Computer Studies 64 2 (2006) 103\u2013122. 10.1016\/j.ijhcs.2005.06.004","DOI":"10.1016\/j.ijhcs.2005.06.004"},{"key":"e_1_3_3_2_67_2","doi-asserted-by":"publisher","DOI":"10.1787\/44f5e846-en"},{"key":"e_1_3_3_2_68_2","volume-title":"Introducing Operator-Safety and Privacy","year":"2025","unstructured":"OpenAI. 2025. Introducing Operator-Safety and Privacy. https:\/\/openai.com\/index\/introducing-operator\/"},{"key":"e_1_3_3_2_69_2","doi-asserted-by":"publisher","unstructured":"R. Parasuraman T.B. Sheridan and C.D. Wickens. 2000. A model for types and levels of human interaction with automation. IEEE Transactions on Systems Man and Cybernetics - Part A: Systems and Humans 30 3 (2000) 286\u2013297. 10.1109\/3468.844354","DOI":"10.1109\/3468.844354"},{"key":"e_1_3_3_2_70_2","doi-asserted-by":"publisher","unstructured":"Peter\u00a0S. Park Simon Goldstein Aidan O\u2019Gara Michael Chen and Dan Hendrycks. 2024. AI deception: A survey of examples risks and potential solutions. Patterns 5 5 (2024) 100988. 10.1016\/j.patter.2024.100988","DOI":"10.1016\/j.patter.2024.100988"},{"key":"e_1_3_3_2_71_2","doi-asserted-by":"publisher","DOI":"10.1145\/3746059.3747797"},{"key":"e_1_3_3_2_72_2","doi-asserted-by":"publisher","unstructured":"Yulu Pi and Maddie Proctor. 2025. Toward empowering AI governance with redress mechanisms. Cambridge Forum on AI: Law and Governance 1 (2025) e24. 10.1017\/cfl.2025.9","DOI":"10.1017\/cfl.2025.9"},{"key":"e_1_3_3_2_73_2","doi-asserted-by":"publisher","DOI":"10.1145\/3706598.3713357"},{"key":"e_1_3_3_2_74_2","doi-asserted-by":"publisher","unstructured":"Clayton\u00a0D. Rothwell Valerie\u00a0L. Shalin and Griffin\u00a0D. Romigh. 2021. Comparison of Common Ground Models for Human\u2013Computer Dialogue: Evidence for Audience Design. ACM Trans. Comput.-Hum. Interact. 28 2 Article 9 (April 2021) 35\u00a0pages. 10.1145\/3410876","DOI":"10.1145\/3410876"},{"key":"e_1_3_3_2_75_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642564"},{"key":"e_1_3_3_2_76_2","doi-asserted-by":"publisher","unstructured":"Shelle Santana Steven\u00a0K. Dallas and Vicki\u00a0G. Morwitz. 2020. Consumer reactions to drip pricing. Marketing Science 39 1 (Jan 2020) 188\u2013210. 10.1287\/mksc.2019.1207","DOI":"10.1287\/mksc.2019.1207"},{"key":"e_1_3_3_2_77_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642661"},{"key":"e_1_3_3_2_78_2","doi-asserted-by":"publisher","DOI":"10.1145\/3746059.3747722"},{"key":"e_1_3_3_2_79_2","doi-asserted-by":"publisher","DOI":"10.3233\/FAIA230505"},{"key":"e_1_3_3_2_80_2","doi-asserted-by":"crossref","unstructured":"Yijia Shao Tianshi Li Weiyan Shi Yanchen Liu and Diyi Yang. 2024. Privacylens: Evaluating privacy norm awareness of language models in action. Advances in Neural Information Processing Systems 37 (2024) 89373\u201389407.","DOI":"10.52202\/079017-2837"},{"key":"e_1_3_3_2_81_2","unstructured":"Yijia Shao Vinay Samuel Yucheng Jiang John Yang and Diyi Yang. 2025. Collaborative Gym: A Framework for Enabling and Evaluating Human-Agent Collaboration. arxiv:https:\/\/arXiv.org\/abs\/2412.15701\u00a0[cs.AI] https:\/\/arxiv.org\/abs\/2412.15701"},{"key":"e_1_3_3_2_82_2","doi-asserted-by":"publisher","unstructured":"Yucheng Shi Wenhao Yu Zaitang Li Yonglin Wang Hongming Zhang Ninghao Liu Haitao Mi and Dong Yu. 2025. MobileGUI-RL: Advancing Mobile GUI Agent through Reinforcement Learning in Online Environment. ArXiv abs\/2507.05720 (2025). 10.48550\/arXiv.2507.05720","DOI":"10.48550\/arXiv.2507.05720"},{"key":"e_1_3_3_2_83_2","series-title":"(NIPS \u201922)","volume-title":"Proceedings of the 36th International Conference on Neural Information Processing Systems","author":"Skalse Joar","year":"2022","unstructured":"Joar Skalse, Nikolaus H.\u00a0R. Howe, Dmitrii Krasheninnikov, and David Krueger. 2022. Defining and characterizing reward hacking. In Proceedings of the 36th International Conference on Neural Information Processing Systems (New Orleans, LA, USA) (NIPS \u201922). Curran Associates Inc., Red Hook, NY, USA, Article 687, 12\u00a0pages."},{"key":"e_1_3_3_2_84_2","doi-asserted-by":"publisher","unstructured":"Kristina Suchotzki and Matthias Gamer. 2024. Detecting deception with artificial intelligence: promises and perils. Trends in Cognitive Sciences 28 6 (2024) 481\u2013483. 10.1016\/j.tics.2024.04.002","DOI":"10.1016\/j.tics.2024.04.002"},{"key":"e_1_3_3_2_85_2","doi-asserted-by":"publisher","unstructured":"Zhongxiang Sun Qipeng Wang Haoyu Wang Xiao Zhang and Jun Xu. 2025. Detection and Mitigation of Hallucination in Large Reasoning Models: A Mechanistic Perspective. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2505.12886 (2025). 10.48550\/arXiv.2505.12886","DOI":"10.48550\/arXiv.2505.12886"},{"key":"e_1_3_3_2_86_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.emnlp-main.47"},{"key":"e_1_3_3_2_87_2","series-title":"(NIPS \u201923)","volume-title":"Proceedings of the 37th International Conference on Neural Information Processing Systems","author":"Turpin Miles","year":"2023","unstructured":"Miles Turpin, Julian Michael, Ethan Perez, and Samuel\u00a0R. Bowman. 2023. Language models don\u2019t always say what they think: unfaithful explanations in chain-of-thought prompting. In Proceedings of the 37th International Conference on Neural Information Processing Systems (New Orleans, LA, USA) (NIPS \u201923). Curran Associates Inc., Red Hook, NY, USA, Article 3275, 14\u00a0pages."},{"key":"e_1_3_3_2_88_2","doi-asserted-by":"publisher","unstructured":"Amos Tversky and Daniel Kahneman. 1974. Judgment under Uncertainty: Heuristics and Biases. Science 185 4157 (1974) 1124\u20131131. arXiv:https:\/\/www.science.org\/doi\/pdf\/10.1126\/science.185.4157.112410.1126\/science.185.4157.1124","DOI":"10.1126\/science.185.4157.1124"},{"key":"e_1_3_3_2_89_2","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354212"},{"key":"e_1_3_3_2_90_2","unstructured":"Guanzhi Wang Yuqi Xie Yunfan Jiang Ajay Mandlekar Chaowei Xiao Yuke Zhu Linxi Fan and Anima Anandkumar. 2024. Voyager: An Open-Ended Embodied Agent with Large Language Models. Transactions on Machine Learning Research (2024). https:\/\/openreview.net\/forum?id=ehfRiF0R3a"},{"key":"e_1_3_3_2_91_2","doi-asserted-by":"publisher","unstructured":"D.\u00a0E. Wilkins T.\u00a0J. Lee and P. Berry. 2003. Interactive Execution Monitoring of Agent Teams. Journal of Artificial Intelligence Research 18 (March 2003) 217\u2013261. 10.1613\/jair.1112","DOI":"10.1613\/jair.1112"},{"key":"e_1_3_3_2_92_2","doi-asserted-by":"publisher","DOI":"10.1145\/3706598.3713493"},{"key":"e_1_3_3_2_93_2","unstructured":"Shuning Zhang Jingruo Chen Zhiqi Gao Jiajing Gao Xin Yi and Hewu Li. 2025. Characterizing Unintended Consequences in Human-GUI Agent Collaboration for Web Browsing. arxiv:https:\/\/arXiv.org\/abs\/2505.09875\u00a0[cs.HC] https:\/\/arxiv.org\/abs\/2505.09875"},{"key":"e_1_3_3_2_94_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2025.acl-long.411"},{"key":"e_1_3_3_2_95_2","doi-asserted-by":"publisher","DOI":"10.1145\/3708359.3712153"}],"event":{"name":"CHI 2026: CHI Conference on Human Factors in Computing Systems","location":"Barcelona Spain","acronym":"CHI '26","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2026 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3772318.3791568","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3772318.3791568","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T10:08:46Z","timestamp":1776420526000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3772318.3791568"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4,13]]},"references-count":94,"alternative-id":["10.1145\/3772318.3791568","10.1145\/3772318"],"URL":"https:\/\/doi.org\/10.1145\/3772318.3791568","relation":{},"subject":[],"published":{"date-parts":[[2026,4,13]]},"assertion":[{"value":"2026-04-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}