
way for shared knowledge-building. arXiv preprint
arXiv:2309.09640.
Gray, C. M., Santos, C., Bielova, N., Toth, M., and Clifford,
D. (2021). Dark patterns and the legal requirements
of consent banners: An interaction criticism perspec-
tive. In Proceedings of the 2021 CHI Conference on
Human Factors in Computing Systems, pages 1–18.
Graßl, P., Schraffenberger, H., Borgesius, F. Z., and Bui-
jzen, M. (2021). Dark and bright patterns in cookie
consent requests. Journal of Digital Social Research,
3(1):1–38.
Greenberg, S., Boring, S., Vermeulen, J., and Dostal, J.
(2014). Dark patterns in proxemic interactions: a criti-
cal perspective. In Proceedings of the 2014 conference
on Designing interactive systems, pages 523–532.
Gunawan, J., Santos, C., and Kamara, I. (2022). Redress for
dark patterns privacy harms? a case study on consent
interactions. In Proceedings of the 2022 Symposium
on Computer Science and Law, pages 181–194.
Habib, H., Zou, Y., Jannu, A., Sridhar, N., Swoopes, C.,
Acquisti, A., Cranor, L. F., Sadeh, N., and Schaub,
F. (2019). An empirical analysis of data deletion
and {Opt-Out} choices on 150 websites. In Fifteenth
Symposium on Usable Privacy and Security (SOUPS
2019), pages 387–406.
Hasan Mansur, S. M., Salma, S., Awofisayo, D., and Moran,
K. (2023). Aidui: Toward automated recognition of
dark patterns in user interfaces. In 2023 IEEE/ACM
45th International Conference on Software Engineer-
ing (ICSE), page 1958–1970.
Huth, D. and Matthes, F. (2019). “appropriate technical
and organizational measures”: Identifying privacy en-
gineering approaches to meet gdpr requirements.
Islam, S., Mouratidis, H., Kalloniatis, C., Hudic, A., and
Zechner, L. (2012). Model based process to support
security and privacy requirements engineering. In-
ternational Journal of Secure Software Engineering
(IJSSE), 3(3):1–22.
ISO (2023). Iso 31700-1:2023 consumer protection — pri-
vacy by design for consumer goods and services —
part 1: High-level requirements.
ISO/IEC (2002). ISO/IEC 15288:2002 systems engineering
– systems life cycle processes.
ISO/IEC 29100:2011 (2011). Information technology - Se-
curity techniques - Privacy framework. Standard, In-
ternational Organization for Standardization, Geneva,
CH.
Jarovsky, L. (2022). Dark patterns in personal data collec-
tion: Definition, taxonomy and lawfulness. Taxonomy
and Lawfulness (March 1, 2022).
Kitkowska, A. (2023). The hows and whys of dark pat-
terns: Categorizations and privacy. Human Factors in
Privacy Research, pages 173–198.
Kocyigit, E., Rossi, A., and Lenzini, G. (2023). Towards
assessing features of dark patterns in cookie consent
processes. In Bieker, F., Meyer, J., Pape, S., Schiering,
I., and Weich, A., editors, Privacy and Identity Man-
agement, IFIP Advances in Information and Commu-
nication Technology, page 165–183, Cham. Springer
Nature Switzerland.
Kollnig, K., Datta, S., and Van Kleek, M. (2021). I want
my app that way: Reclaiming sovereignty over per-
sonal devices. In Extended Abstracts of the 2021 CHI
Conference on Human Factors in Computing Systems,
pages 1–8.
Krauß, V. (2022). Exploring dark patterns in xr.
Luguri, J. and Strahilevitz, L. J. (2021). Shining a light on
dark patterns. Journal of Legal Analysis, 13(1):43–
109.
Martin, Y.-S. and Kung, A. (2018). Methods and tools for
gdpr compliance through privacy and data protection
engineering. In 2018 IEEE European symposium on
security and privacy workshops (EuroS&PW), pages
108–111. IEEE.
Martini, P., Drews, C., et al. (2022). Making choice
meaningful–tackling dark patterns in cookie and con-
sent banners through european data privacy law. Avail-
able at SSRN 4257979.
Mathur, A., Acar, G., Friedman, M. J., Lucherini, E.,
Mayer, J., Chetty, M., and Narayanan, A. (2019). Dark
patterns at scale: Findings from a crawl of 11k shop-
ping websites. Proceedings of the ACM on Human-
Computer Interaction, 3(CSCW):1–32.
Mathur, A., Kshirsagar, M., and Mayer, J. (2021). What
makes a dark pattern... dark? design attributes, nor-
mative considerations, and measurement methods. In
Proceedings of the 2021 CHI conference on human
factors in computing systems, pages 1–18.
Matte, C., Bielova, N., and Santos, C. (2020). Do cookie
banners respect my choice?: Measuring legal compli-
ance of banners from iab europe’s transparency and
consent framework. In 2020 IEEE Symposium on Se-
curity and Privacy (SP), pages 791–809. IEEE.
Mead, N. R. and Stehney, T. (2005). Security quality re-
quirements engineering (square) methodology. ACM
SIGSOFT Software Engineering Notes, 30(4):1–7.
NCC (2018). Deceived by design, how tech companies
use dark patterns to discourage us from exercising our
rights to privacy. Norwegian Consumer Council Re-
port.
OECD (2023). Consumer vulnerability in the digital age.
Number 355 in OECD Digital Economy Papers. Paris.
Owens, K., Gunawan, J., Choffnes, D., Emami-Naeini, P.,
Kohno, T., and Roesner, F. (2022). Exploring decep-
tive design patterns in voice interfaces. In Proceedings
of the 2022 European Symposium on Usable Security,
pages 64–78.
Rossi, A. and Bongard-Blanchy, K. (2021). All in one
stroke? intervention spaces for dark patterns. arXiv
preprint arXiv:2103.08483.
Sangaroonsilp, P., Dam, H. K., Choetkiertikul, M.,
Ragkhitwetsagul, C., and Ghose, A. (2023). A taxon-
omy for mining and classifying privacy requirements
in issue reports. Information and Software Technol-
ogy, 157:107162.
Santos, C., Rossi, A., Sanchez Chamorro, L., Bongard-
Blanchy, K., and Abu-Salma, R. (2021). Cookie ban-
ners, what’s the purpose? analyzing cookie banner
text through a legal lens. In Proceedings of the 20th
Workshop on Workshop on Privacy in the Electronic
Learning from the Dark Side About How (not) to Engineer Privacy: Analysis of Dark Patterns Taxonomies from an ISO 29100 Perspective
783