{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T03:46:20Z","timestamp":1776051980865,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":87,"publisher":"ACM","funder":[{"name":"Leibniz ScienceCampus Bremen Digital Public Health, which is jointly funded by the Leibniz Association, the Federal State of Bremen, and the Leibniz Institute for Prevention Research and Epidemiology \u2013 BIPS","award":["Leibniz Association (W72\/2022)"],"award-info":[{"award-number":["Leibniz Association (W72\/2022)"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2026,4,13]]},"DOI":"10.1145\/3772363.3778758","type":"proceedings-article","created":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T01:55:24Z","timestamp":1776045324000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Bridge Over Troubled Water: Aligning Commercial Incentives With Ethical Design Practice To Combat Deceptive Patterns"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1712-0741","authenticated-orcid":false,"given":"Thomas","family":"E\u00dfmeyer","sequence":"first","affiliation":[{"name":"University of Bremen, Bremen, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5813-9019","authenticated-orcid":false,"given":"Johanna","family":"Gunawan","sequence":"additional","affiliation":[{"name":"Maastricht University, Maastricht, Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7307-1550","authenticated-orcid":false,"given":"Colin M.","family":"Gray","sequence":"additional","affiliation":[{"name":"Indiana University, Bloomington, Indiana, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4592-3701","authenticated-orcid":false,"given":"Lorena","family":"S\u00e1nchez Chamorro","sequence":"additional","affiliation":[{"name":"University of Twente, Enschede, Netherlands"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9746-2476","authenticated-orcid":false,"given":"Alberto","family":"Monge Roffarello","sequence":"additional","affiliation":[{"name":"Politecnico di Torino, Torino, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7812-9096","authenticated-orcid":false,"given":"Katie","family":"Seaborn","sequence":"additional","affiliation":[{"name":"Institute of Science Tokyo, Tokyo, Japan and University of Cambridge, Cambridge, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4169-0197","authenticated-orcid":false,"given":"Hauke","family":"Sandhaus","sequence":"additional","affiliation":[{"name":"Cornell University, Ithaca, New York, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5069-6817","authenticated-orcid":false,"given":"Kai","family":"Lukoff","sequence":"additional","affiliation":[{"name":"Santa Clara University, Santa Clara, California, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1233-234X","authenticated-orcid":false,"given":"Gian-Luca","family":"Savino","sequence":"additional","affiliation":[{"name":"Gottlieb Duttweiler Institute, Zurich, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2294-0119","authenticated-orcid":false,"given":"Shruthi Sai","family":"Chivukula","sequence":"additional","affiliation":[{"name":"Pratt Institute, New York City, New York, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3492-7093","authenticated-orcid":false,"given":"Satoshi","family":"Nakamura","sequence":"additional","affiliation":[{"name":"Meiji University, Nakano, Tokyo, Japan"}]}],"member":"320","published-online":{"date-parts":[[2026,4,13]]},"reference":[{"key":"e_1_3_3_2_2_2","unstructured":"2025. Competition and Markets Authority. https:\/\/www.gov.uk\/government\/organisations\/competition-and-markets-authority. Visted on 2025-09-24."},{"key":"e_1_3_3_2_3_2","volume-title":"Words matter: Alternatives for charged terminology in the computing profession","author":"Machinery Association for Computing","year":"2023","unstructured":"Association for Computing Machinery. 2023. Words matter: Alternatives for charged terminology in the computing profession. https:\/\/www.acm.org\/diversity-inclusion\/words-matter Visited on 2023-07-31."},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/3571884.3597441"},{"key":"e_1_3_3_2_5_2","unstructured":"European Data\u00a0Protection Board. March 2022. Guidelines 3\/2022 on Dark patterns in social media platform interfaces: How to recognise and avoid them | European Data Protection Board. https:\/\/edpb.europa.eu\/our-work-tools\/documents\/public-consultations\/2022\/guidelines-32022-dark-patterns-social-media_en Visited on 2022-03-29."},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"publisher","unstructured":"Kerstin Bongard-Blanchy Arianna Rossi Salvador Rivas Sophie Doublet Vincent Koenig and Gabriele Lenzini. 2021. I am Definitely Manipulated Even When I am Aware of it. It s Ridiculous! \u2013 Dark Patterns from the End-User Perspective. Designing Interactive Systems Conference 2021 (June 2021) 763\u2013776. 10.1145\/3461778.3462086","DOI":"10.1145\/3461778.3462086"},{"key":"e_1_3_3_2_7_2","unstructured":"California State Legislature. 2018. CCPA-18 2018. California Consumer Privacy Act of 2018 [1798.100 - 1798.199] (CCPA).https:\/\/leginfo.legislature.ca.gov\/faces\/codes_displayText.xhtml?division=3.&part=4.&lawCode=CIV&title=1.81.5. Visited on 2022-03-29."},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300733"},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613905.3650997"},{"key":"e_1_3_3_2_10_2","unstructured":"Sai\u00a0Shruthi Chivukula. [n. d.]. Trace the (Ethical) Complexity Toolkit. https:\/\/shruthichivukula.com\/aeiou-toolkit\/tracethecomplexity-ethicstool. Accessed: 2025-9-23."},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.25394\/PGS.15036321.v1"},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445375"},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/3742901.3742919"},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1145\/3715336.3735776"},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/3563703.3596632"},{"key":"e_1_3_3_2_16_2","unstructured":"Colorado Department of Law Colorado Attorney General\u2019s Office. 2025. Colorado Privacy Act Resource. https:\/\/coag.gov\/resources\/colorado-privacy-act\/. Visited on 2025-08-26."},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/3719160.3728624"},{"key":"e_1_3_3_2_18_2","unstructured":"European Commission. 2022. Proposal for a regulation of the European Parliament and of the Council on a Single Market For Digital Services (Digital Services Act) and amending Directive 2000\/31\/EC. https:\/\/www.europarl.europa.eu\/doceo\/document\/TA-9-2022-0014_EN.html Visited on 2022-03-29."},{"key":"e_1_3_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/1541948.1541999"},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/3715275.3732185"},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300408"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/3656156.3663698"},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613905.3636310"},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"publisher","unstructured":"Colin\u00a0M. Gray Yubo Kou Bryan Battles Joseph Hoggatt and Austin\u00a0L. Toombs. 2018. The Dark (Patterns) Side of UX Design. (2018) 1\u201314. 10.1145\/3173574.3174108","DOI":"10.1145\/3173574.3174108"},{"key":"e_1_3_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544549.3573790"},{"key":"e_1_3_3_2_26_2","unstructured":"Colin\u00a0M. Gray Thomas Mildner and Nataliia Bielova. 2023. Temporal Analysis of Dark Patterns: A Case Study of a User\u2019s Odyssey to Conquer Prime Membership Cancellation through the \u201cIliad Flow\u201d. arXiv. arxiv:https:\/\/arXiv.org\/abs\/2309.09635http:\/\/arxiv.org\/abs\/2309.09635"},{"key":"e_1_3_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/3706598.3713828"},{"key":"e_1_3_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642302"},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445779"},{"key":"e_1_3_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544549.3583173"},{"key":"e_1_3_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642436"},{"key":"e_1_3_3_2_32_2","unstructured":"Johanna Gunawan Woodrow Hartzog Neil Richards David Choffnes and Christo Wilson. 2025. Dark Patterns as Disloyal Design. Indiana Law Journal 100 4 (2025) 3. https:\/\/www.repository.law.indiana.edu\/ilj\/vol100\/iss4\/3\/"},{"key":"e_1_3_3_2_33_2","doi-asserted-by":"publisher","unstructured":"Johanna Gunawan Amogh Pradeep David Choffnes Woodrow Hartzog and Christo Wilson. 2021. A Comparative Study of Dark Patterns Across Web and Mobile Modalities. Proceedings of the ACM on Human-Computer Interaction 5 CSCW2 (Oct. 2021) 1\u201329. 10.1145\/3479521","DOI":"10.1145\/3479521"},{"key":"e_1_3_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.1145\/3511265.3550448"},{"key":"e_1_3_3_2_35_2","doi-asserted-by":"publisher","unstructured":"Pelle\u00a0Guldborg Hansen and Andreas\u00a0Maal\u00f8e Jespersen. 2013. Nudge and the Manipulation of Choice: A Framework for the Responsible Use of the Nudge Approach to Behaviour Change in Public Policy. European Journal of Risk Regulation 4 1 (March 2013) 3\u201328. 10.1017\/S1867299X00002762","DOI":"10.1017\/S1867299X00002762"},{"key":"e_1_3_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580942"},{"key":"e_1_3_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29384-02"},{"key":"e_1_3_3_2_38_2","unstructured":"\u00d8yvind Kaldestad. 2021. Amazon manipulates customers to stay subscribed. https:\/\/www.forbrukerradet.no\/news-in-english\/amazon-manipulates-customers-to-stay-subscribed\/ Visited on 2024-01-26."},{"key":"e_1_3_3_2_39_2","doi-asserted-by":"publisher","unstructured":"Ha\u00a0Young Kang Ha\u00a0Young Kang Jae\u00a0Young Yun and Jae\u00a0Young Yun. 2020. The Effect of\u2018Dark Patterns\u2019 of UX Design on User Experience and Willingness to Repurchase. Archives of Design Research 33 3 (Aug. 2020) 191\u2013209. 10.15187\/adr.2020.08.33.3.191","DOI":"10.15187\/adr.2020.08.33.3.191"},{"key":"e_1_3_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-35599-826"},{"key":"e_1_3_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581432"},{"key":"e_1_3_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.1145\/3603555.3603567"},{"key":"e_1_3_3_2_43_2","doi-asserted-by":"publisher","unstructured":"Jamie Luguri and Lior\u00a0Jacob Strahilevitz. 2021. Shining a Light on Dark Patterns. Journal of Legal Analysis 13 1 (March 2021) 43\u2013109. 10.1093\/jla\/laaa006","DOI":"10.1093\/jla\/laaa006"},{"key":"e_1_3_3_2_44_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411763.3441360"},{"key":"e_1_3_3_2_45_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445467"},{"key":"e_1_3_3_2_46_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580703"},{"key":"e_1_3_3_2_47_2","doi-asserted-by":"publisher","unstructured":"Kai Lukoff Cissy Yu Julie Kientz and Alexis Hiniker. 2018. What Makes Smartphone Use Meaningful or Meaningless? Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 2 1 Article 22 (March 2018) 26\u00a0pages. 10.1145\/3191754","DOI":"10.1145\/3191754"},{"key":"e_1_3_3_2_48_2","doi-asserted-by":"publisher","unstructured":"Ulrik Lyngs Kai Lukoff Laura Csuka Petr Slov\u00e1k Max Van\u00a0Kleek and Nigel Shadbolt. 2022. The Goldilocks Level of Support: Using User Reviews Ratings and Installation Numbers to Investigate Digital Self-Control Tools. International journal of human-computer studies (June 2022) 102869. 10.1016\/j.ijhcs.2022.102869","DOI":"10.1016\/j.ijhcs.2022.102869"},{"key":"e_1_3_3_2_49_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300361"},{"key":"e_1_3_3_2_50_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376672"},{"key":"e_1_3_3_2_51_2","doi-asserted-by":"publisher","unstructured":"Arunesh Mathur Gunes Acar Michael\u00a0J. Friedman Elena Lucherini Jonathan Mayer Marshini Chetty and Arvind Narayanan. 2019. Dark Patterns at Scale: Findings from a Crawl of 11K Shopping Websites. Proceedings of the ACM on Human-Computer Interaction 3 CSCW (Nov. 2019) 1\u201332. 10.1145\/3359183","DOI":"10.1145\/3359183"},{"key":"e_1_3_3_2_52_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642542"},{"key":"e_1_3_3_2_53_2","doi-asserted-by":"publisher","DOI":"10.1145\/3706598.3713776"},{"key":"e_1_3_3_2_54_2","doi-asserted-by":"publisher","DOI":"10.1145\/3563657.3595964"},{"key":"e_1_3_3_2_55_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411763.3451659"},{"key":"e_1_3_3_2_56_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580695"},{"key":"e_1_3_3_2_57_2","doi-asserted-by":"publisher","DOI":"10.1145\/3701571.3701605"},{"key":"e_1_3_3_2_58_2","doi-asserted-by":"publisher","unstructured":"Thomas Mildner Gian-Luca Savino Johannes Sch\u00f6ning and Rainer Malaka. 2024. Dark Patterns: manipulative Designstrategien in digitalen Gesundheitsanwendungen. Bundesgesundheitsblatt - Gesundheitsforschung - Gesundheitsschutz. 10.1007\/s00103-024-03840-6","DOI":"10.1007\/s00103-024-03840-6"},{"key":"e_1_3_3_2_59_2","unstructured":"Ministry of Consumer Affairs Food & Public Distribution. 2023. Central Consumer Protection Authority issues \u2018Guidelines for Prevention and Regulation of Dark Patterns 2023\u2019 for prevention and regulation of dark patterns listing 13 specified dark patterns. https:\/\/pib.gov.in\/PressReleaseIframePage.aspx?PRID=1983994 Visited on 12\/21\/2023."},{"key":"e_1_3_3_2_60_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300616"},{"key":"e_1_3_3_2_61_2","doi-asserted-by":"publisher","unstructured":"Alberto Monge\u00a0Roffarello and Luigi De\u00a0Russis. 2023. Achieving Digital Wellbeing Through Digital Self-control Tools: A Systematic Review and Meta-analysis. ACM Trans. Comput.-Hum. Interact. 30 4 Article 53 (Sept. 2023) 66\u00a0pages. 10.1145\/3571810","DOI":"10.1145\/3571810"},{"key":"e_1_3_3_2_62_2","doi-asserted-by":"publisher","unstructured":"Alberto Monge\u00a0Roffarello Luigi De\u00a0Russis and Kai Lukoff. 2025. The Digital Attention Heuristics: Supporting the User\u2019s Attention by Design. ACM Trans. Comput.-Hum. Interact. 32 4 Article 38 (Aug. 2025) 41\u00a0pages. 10.1145\/3725215","DOI":"10.1145\/3725215"},{"key":"e_1_3_3_2_63_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580729"},{"key":"e_1_3_3_2_64_2","unstructured":"OECD. 2022. Dark commercial patterns. 96\u00a0pages."},{"key":"e_1_3_3_2_65_2","doi-asserted-by":"publisher","DOI":"10.1145\/3549015.3554213"},{"key":"e_1_3_3_2_66_2","doi-asserted-by":"publisher","DOI":"10.56553\/popets-2025-0027"},{"key":"e_1_3_3_2_67_2","unstructured":"Doris\u00a0Maria Rhomberg* and Hauke Sandhaus*. 2024. Towards Quantifying Ethical User Experience: Evaluating User Perceptions of Dark Patterns in Social Media. Mobilizing Research and Regulatory Action on Dark Patterns and Deceptive Design Practices Workshop at CHI Conference on Human Factors in Computing Systems (May 2024). * = equal contribution."},{"key":"e_1_3_3_2_68_2","first-page":"69","volume-title":"IFIP Conference on Human-Computer Interaction","author":"Ribeiro Levi","year":"2025","unstructured":"Levi Ribeiro, Lucas Melo, Gabriel Lima, Amanda Coelho, and Ticianne Darin. 2025. It\u2019s Like a Dark Patterns Paradise: New Findings from Brazilian Mobile Apps in Light of International Research. In IFIP Conference on Human-Computer Interaction. Springer, 69\u201378."},{"key":"e_1_3_3_2_69_2","doi-asserted-by":"publisher","unstructured":"Arianna Rossi Rachele Carli Marietjie\u00a0W. Botes Angelica Fernandez Anastasia Sergeeva and Lorena S\u00e1nchez\u00a0Chamorro. 2024. Who is vulnerable to deceptive design patterns? A transdisciplinary perspective on the multi-dimensional nature of digital vulnerability. Computer Law & Security Review 55 (Nov. 2024) 106031. 10.1016\/j.clsr.2024.106031","DOI":"10.1016\/j.clsr.2024.106031"},{"key":"e_1_3_3_2_70_2","doi-asserted-by":"publisher","DOI":"10.1145\/3563657.3596013"},{"key":"e_1_3_3_2_71_2","doi-asserted-by":"publisher","DOI":"10.1145\/3643834.3660704"},{"key":"e_1_3_3_2_72_2","unstructured":"Hauke Sandhaus. 2023. Promoting Bright Patterns. Position Paper at the Workshop\" Designing Technology and Policy Simultaneously: Towards A Research Agenda and New Practice\" at the CHI Conference on Human Factors in Computing Systems (CHI\u201923). 9 pages. arXiv preprint arXiv.2304.01157 (2023)."},{"key":"e_1_3_3_2_73_2","doi-asserted-by":"publisher","DOI":"10.1145\/3715336.3735805"},{"key":"e_1_3_3_2_74_2","unstructured":"Hauke Sandhaus Angel Wang Qian Yang and Wendy Ju. 2024. My Precious Crash Data: Barriers and Opportunities in Encouraging Autonomous Driving Companies to Share Safety-Critical Data. arxiv:https:\/\/arXiv.org\/abs\/2504.17792\u00a0[cs.HC] https:\/\/arxiv.org\/abs\/2504.17792 To appear in Proc. ACM Hum.-Comput. Interact. Computer-Supported Cooperative Work and Social Computing (CSCW) 2025."},{"key":"e_1_3_3_2_75_2","doi-asserted-by":"publisher","unstructured":"Brennan Schaffner Neha\u00a0A. Lingareddy and Marshini Chetty. 2022. Understanding Account Deletion and Relevant Dark Patterns on Social Media. Proceedings of the ACM on Human-Computer Interaction 6 CSCW2 (Nov. 2022) 1\u201343. 10.1145\/3555142","DOI":"10.1145\/3555142"},{"key":"e_1_3_3_2_76_2","doi-asserted-by":"publisher","DOI":"10.1145\/3706599.3716294"},{"key":"e_1_3_3_2_77_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613905.3651099"},{"key":"e_1_3_3_2_78_2","unstructured":"J. Sharma. 2023. Dark Patterns in a bright world: An analysis of the Indian Consumer Legal Architecture. IJCLP 11 (2023) 123."},{"key":"e_1_3_3_2_79_2","doi-asserted-by":"publisher","DOI":"10.1145\/3563657.3596013"},{"key":"e_1_3_3_2_80_2","doi-asserted-by":"publisher","DOI":"10.1145\/3643834.3661513"},{"key":"e_1_3_3_2_81_2","volume-title":"Nudge: improving decisions about health, wealth, and happiness","author":"Thaler Richard\u00a0H.","year":"2008","unstructured":"Richard\u00a0H. Thaler and Cass\u00a0R. Sunstein. 2008. Nudge: improving decisions about health, wealth, and happiness. Yale University Press, New Haven. OCLC: ocn181517463."},{"key":"e_1_3_3_2_82_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-35599-8_33"},{"key":"e_1_3_3_2_83_2","unstructured":"UK Parliament House of Common. 2024. Digital Markets Competition and Consumers Act 2024 - Parliamentary Bills - UK Parliament. https:\/\/bills.parliament.uk\/bills\/3453"},{"key":"e_1_3_3_2_84_2","doi-asserted-by":"publisher","unstructured":"Peter-Paul Verbeek. 2006. Materializing Morality: Design Ethics and Technological Mediation. Science Technology & Human Values 31 3 (May 2006) 361\u2013380. 10.1177\/0162243905285847Publisher: SAGE Publications Inc.","DOI":"10.1177\/0162243905285847"},{"key":"e_1_3_3_2_85_2","doi-asserted-by":"publisher","unstructured":"Christian Voigt Stephan Schl\u00f6gl and Aleksander Groth. 2021. Dark Patterns in Online Shopping: Of Sneaky Tricks Perceived Annoyance and Respective Brand Trust. Vol.\u00a012783. 143\u2013155. 10.1007\/978-3-030-77750-010arXiv:https:\/\/arXiv.org\/abs\/2107.07893.","DOI":"10.1007\/978-3-030-77750-010"},{"key":"e_1_3_3_2_86_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-85607-645"},{"key":"e_1_3_3_2_87_2","doi-asserted-by":"publisher","DOI":"10.1145\/3701571.3701608"},{"key":"e_1_3_3_2_88_2","doi-asserted-by":"publisher","DOI":"10.4324\/9781003320609-27"}],"event":{"name":"CHI EA '26: Extended Abstracts of the 2026 CHI Conference on Human Factors in Computing Systems","location":"Barcelona , Spain","acronym":"CHI EA '26","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the Extended Abstracts of the 2026 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3772363.3778758","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T03:11:28Z","timestamp":1776049888000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3772363.3778758"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4,13]]},"references-count":87,"alternative-id":["10.1145\/3772363.3778758","10.1145\/3772363"],"URL":"https:\/\/doi.org\/10.1145\/3772363.3778758","relation":{},"subject":[],"published":{"date-parts":[[2026,4,13]]},"assertion":[{"value":"2026-04-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}