[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

“Deception Detected!”—A Serious Game About Detecting Dark Patterns

  • Conference paper
  • First Online:
Games and Learning Alliance (GALA 2024)

Abstract

Dark patterns are malicious user interface design strategies that nudge users toward decisions that may be against their best interests. As countermeasures, related work has explored legislation, detecting and modifying web content with such patterns, and educating users about dark patterns. Serious games that teach detecting and classifying dark patterns, however, have received little attention so far. We present a web-based prototype of such a game targeting adults and the results of a comprehensive user study investigating its effectiveness and knowledge retention among participants. Our findings demonstrate that participants became better at detecting dark patterns, indicating that they became more aware of such design manipulations. While our analysis of participants’ classification abilities yields mixed results, our game log data confirms that their detection skills increased.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 89.99
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 109.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    While the ACM Diversity, Equity and Inclusion Council already considers the term to be problematic, the research community has not agreed on a different name yet. Therefore, we use the term to better connect with the existing literature.

  2. 2.

    https://www.deceptive.design, last accessed July 17, 2024.

  3. 3.

    https://www.deceptive.design/hall-of-shame, last accessed July 17, 2024.

  4. 4.

    All accepted papers to the workshop are available at https://ceur-ws.org/Vol-3720/, last accessed July 17, 2024.

  5. 5.

    When conducting the study, the updated version of the ontology presented at CHI’24 [10] was not available yet. Hence, our game still uses Nagging as a high-level pattern.

  6. 6.

    https://react.dev/, last accessed July 21, 2024.

  7. 7.

    https://nextjs.org/, last accessed July 21, 2024.

  8. 8.

    https://doi.org/10.17605/OSF.IO/UQ9ZF, last accessed September 20, 2024.

References

  1. Bongard-Blanchy, K., Rossi, A., Rivas, S., Doublet, S., Koenig, V., Lenzini, G.: “I am Definitely Manipulated, Even When I am Aware of it. It’s Ridiculous!” - dark patterns from the end-user perspective. In: Designing Interactive Systems Conference 2021, pp. 763–776. ACM, Virtual Event, USA (2021). https://doi.org/10.1145/3461778.3462086

  2. Bösch, C., Erb, B., Kargl, F., Kopp, H., Pfattheicher, S.: Tales from the dark side: privacy dark strategies and privacy dark patterns. Privacy Enhancing Technol. 2016(4), 237–254 (2016). https://doi.org/10.1515/popets-2016-0038

    Article  Google Scholar 

  3. Brignull, H.: Deceptive Patterns: Exposing the Tricks Tech Companies Use to Control You. Testimonium Limited (2023)

    Google Scholar 

  4. Conti, G., Sobiesk, E.: Malicious interface design: exploiting the user. In: 19th International Conference on World Wide Web, WWW 2010, pp. 271–280. ACM, New York (2010). https://doi.org/10.1145/1772690.1772719

  5. Di Geronimo, L., Braz, L., Fregnan, E., Palomba, F., Bacchelli, A.: UI dark patterns and where to find them: a study on mobile applications and user perception. In: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, CHI 2020, pp. 1–14. Association for Computing Machinery, New York, NY, USA (2020). https://doi.org/10.1145/3313831.3376600

  6. Di Geronimo, L., Braz, L., Fregnan, E., Palomba, F., Bacchelli, A.: UI dark patterns and where to find them: a study on mobile applications and user perception. In: CHI Conference on Human Factors in Computing Systems, CHI 2020, pp. 1–14. ACM, New York (2020). https://doi.org/10.1145/3313831.3376600

  7. European Commission and Directorate-General for Justice and Consumers, Lupiáñez-Villanueva, F., Boluda, A., Bogliacino, F., Liva, G., Lechardoy, L., Rodríguez de las Heras Ballell, T.: Behavioural study on unfair commercial practices in the digital environment: dark patterns and manipulative personalisation (final report). Publications Office of the European Union, Brussels (2022). https://doi.org/10.2838/859030

  8. Gray, C.M., et al.: Mobilizing research and regulatory action on dark patterns and deceptive design practices. In: Extended Abstracts of the 2024 CHI Conference on Human Factors in Computing Systems, CHI EA 2024. ACM, New York (2024). https://doi.org/10.1145/3613905.3636310

  9. Gray, C.M., Santos, C., Bielova, N.: Towards a preliminary ontology of dark patterns knowledge. In: Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems, CHI EA 2023. ACM, New York (2023). https://doi.org/10.1145/3544549.3585676

  10. Gray, C.M., Santos, C.T., Bielova, N., Mildner, T.: An ontology of dark patterns knowledge: foundations, definitions, and a pathway for shared knowledge-building. In: CHI Conference on Human Factors in Computing Systems, CHI 2024. ACM, New York (2024). https://doi.org/10.1145/3613904.3642436

  11. Graßl, P., Schraffenberger, H., Zuiderveen Borgesius, F., Buijzen, M.: Dark and bright patterns in cookie consent requests. J. Digit. Soc. Res. 3(1), 1–38 (2021). https://doi.org/10.33621/jdsr.v3i1.54

  12. Grossklags, J., Acquisti, A.: When 25 cents is too much: an experiment on willingness-to-sell and willingness-to-protect personal information. In: WEIS. Citeseer (2007)

    Google Scholar 

  13. Gunawan, J., Pradeep, A., Choffnes, D., Hartzog, W., Wilson, C.: A comparative study of dark patterns across web and mobile modalities. Proc. ACM Hum.-Comput. Interact. 5(CSCW2), 1–29 (2021). https://doi.org/10.1145/3479521

  14. Krathwohl, D.R.: A revision of bloom’s taxonomy: an overview. Theory Pract. 41(4), 212–218 (2002)

    Article  Google Scholar 

  15. Kronhardt, K., Gerken, J.: Start playing around-serious & persuasive games as a viable counter-measure against deceptive patterns? In: Mobilizing Research and Regulatory Action on Dark Patterns and Deceptive Design Practices Workshop at CHI 2024, Honolulu (2024). https://ceur-ws.org/Vol-3720/paper7.pdf

  16. Löschner, D.M., Pannasch, S.: Measuring the deceptive potential of design patterns: a decision-making game. In: Mobilizing Research and Regulatory Action on Dark Patterns and Deceptive Design Practices Workshop at CHI 2024, Honolulu (2024). https://ceur-ws.org/Vol-3720/paper9.pdf

  17. Lu, Y., Zhang, C., Yang, Y., Yao, Y., Li, T.J.J.: From awareness to action: exploring end-user empowerment interventions for dark patterns in UX. Proc. ACM Hum.-Comput. Interact. 8(CSCW), 1–41 (2024). https://doi.org/10.1145/3637336

  18. Mathur, A., et al.: Dark patterns at scale: findings from a crawl of 11K shopping websites. Proc. ACM Hum.-Comput. Interact. 3(CSCW), 1–32 (2019). https://doi.org/10.1145/3359183

  19. Mildner, T., Freye, M., Savino, G.L., Doyle, P.R., Cowan, B.R., Malaka, R.: Defending against the dark arts: recognising dark patterns in social media. In: 2023 ACM Designing Interactive Systems Conference, DIS 2023, pp. 2362–2374. ACM, New York (2023). https://doi.org/10.1145/3563657.3595964

  20. Potel-Saville, M., Da Rocha, M.: From dark patterns to fair patterns? Usable taxonomy to contribute solving the issue with countermeasures. In: Privacy Technologies and Policy, pp. 145–165. Springer, Cham (2024). https://doi.org/10.1007/978-3-031-61089-9_7

  21. Roepke, R., Schroeder, U.: The problem with teaching defence against the dark arts: a review of game-based learning applications and serious games for cyber security education. In: Lane, H., Zvacek, S., Uhomoibhi, J. (eds.) 11th International Conference on Computer Supported Education, CSEDU 2019, pp. 58–66. SciTePress, Heraklion, Greece (2019). https://doi.org/10.5220/0007706100580066

  22. Röpke, R.: Extending game-based anti-phishing education using personalization: design and implementation of a framework for personalized learning game content in anti-phishing learning games. Doctoral thesis, RWTH Aachen University, Aachen (2023). https://doi.org/10.18154/RWTH-2023-04991

  23. Schäfer, R., Preuschoff, P.M., Röpke, R., Sahabi, S., Borchers, J.: Fighting malicious designs: towards visual countermeasures against dark patterns. In: CHI Conference on Human Factors in Computing Systems, CHI 2024. ACM, New York (2024). https://doi.org/10.1145/3613904.3642661

  24. Tjostheim, I., Ayres-Pereira, V., Wales, C., Manna, A., Egenfeldt-Nielsen, S.: Dark pattern: a serious game for learning about the dangers of sharing data. ECGBL 16(1), 774–783 (2022). https://doi.org/10.34190/ecgbl.16.1.872

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kevin Fiedler .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2025 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Fiedler, K., Schäfer, R., Borchers, J., Röpke, R. (2025). “Deception Detected!”—A Serious Game About Detecting Dark Patterns. In: Schönbohm, A., et al. Games and Learning Alliance. GALA 2024. Lecture Notes in Computer Science, vol 15348. Springer, Cham. https://doi.org/10.1007/978-3-031-78269-5_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-78269-5_18

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-78268-8

  • Online ISBN: 978-3-031-78269-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics