Clustering of Dark Patterns in the User Interfaces of Websites and Online Trading Portals (E-Commerce)
Abstract
:1. Introduction
2. Using Dark Patterns in Application Interfaces
3. Classification of Dark Patterns
- «Trick questions»—by filling out a form, you answer a question that tricks you into giving an answer you didn’t want. On a cursory glance at the question, it seems to ask one thing, but on closer reading, it is asking quite another;
- «Sneak into basket»—you’re trying to buy something, but somewhere along the way, the site adds an item to your cart, often via an opt-out switch or a checkbox on the previous page;
- «Roach motel»—you get into a situation easily but then it is difficult for you to get out of it (for example, a premium subscription);
- «Privacy zuckering»—they tricked you into publicly sharing more information about yourself than you intended. Named after Facebook CEO Mark Zuckerberg;
- «Price comparison prevention»—the seller prevents you from comparing the price of the product with another product, so you cannot make an informed decision;
- «Misdirection»—design focuses your attention on one thing to divert attention from another;
- «Hidden costs»—you get to the last step of the checkout process but find some unexpected charges like shipping, tax, etc.;
- «Bait and switch»—you intend to do one thing but something else happens;
- «Confirmshaming»—the user’s fault for choosing something. The opt-out option is worded in such a way as to shame the user;
- «Disguised ads»—ads disguised as other content or navigation to get you to click on them;
- «Forced continuity»—when your free trial ends and your credit card is being charged insanely; this is exacerbated because unsubscribing becomes difficult in some cases;
- «Friend spam»—a site or other web service that asks you to access email or social media under the pretense of using it for the desired result (such as finding friends) but then spamming all of your contacts in a message.
4. Model of Data Preparation for the Procedure of Clustering Dark Patterns Based on Expert Assessment
- selection of a sample of objects for clustering;
- determination of the set of variables by which the objects in the sample will be evaluated. Normalization of variable values, if necessary;
- calculation of similarity measure values between objects;
- application of the cluster analysis method to create groups of similar objects (clusters);
- presentation of the results of the analysis [31];
- complicated interface (ID);
- data leak (UD);
- cost increase (US);
- impossibility to refuse (UO);
- hidden advertising (UA);
- no sign of a dark pattern in the interface (Z);
- low presence of a dark pattern in the interface (L);
- uncertainty of finding a feature in a dark pattern (N);
- influential presence of a dark pattern in the interface (H);
- dark pattern is always present in the interface (F);
5. Implementation of Cluster Analysis Using the R Language in the RStudio Environment
- confirmationshaming;
- disguised ads;
- «roach motel»;
- bait and switch;
- trick questions;
- privacy zuckering;
- «friend» spam;
- price comparison prevention;
- hidden costs;
- sneak into basket;
- misdirection;
- forced continuity.
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Brignull, H. Dark Patterns. 2018. Available online: https://darkpatterns.org/ (accessed on 9 September 2020).
- Hanson, J.D.; Kysar, D.A. Taking behavioralism seriously: The problem of market manipulation. NYUL Rev. 1999, 74, 630. [Google Scholar]
- Conti, G.; Sobiesk, E. Malicious Interface Design: Exploiting the User. In Proceedings of the 19th International Conference on World Wide Web (WWW ’10), Raleigh, NC, USA, 26–20 April 2010; Association for Computing Machinery: New York, NY, USA, 2010; pp. 271–280. [Google Scholar] [CrossRef]
- Zagal, J.P.; Björk, S.; Lewis, C. Dark patterns in the design of games. In Foundations of Digital Games 2013; Society for the Advancement of the Science of Digital Games: Santa Cruz, CA, USA, 2013; p. 8. [Google Scholar]
- Hannak, A.; Soeller, G.; Lazer, D.; Mislove, A.; Wilson, C. Measuring Price Discrimination and Steering on E-Commerce Web Sites. In Proceedings of the 2014 Conference on Internet Measurement Conference (IMC ’14), Vancouver, BC, Canada, 5–7 November 2014; Association for Computing Machinery: New York, NY, USA, 2014; pp. 305–318. [Google Scholar] [CrossRef]
- Greenberg, S.; Boring, S.; Vermeulen, J.; Dostal, J. Dark Patterns in Proxemic Interactions: A Critical Perspective. In Proceedings of the 2014 Conference on Designing Interactive Systems (DIS ’14), Vancouver, BC, Canada, 21–25 June 2014; ACM: New York, NY, USA, 2014; pp. 523–532. [Google Scholar] [CrossRef]
- Lewis, C. Irresistible Apps: Motivational Design Patterns for Apps, Games, and Web-Based Communities, 1st ed.; Apress: Berkely, CA, USA, 2014. [Google Scholar]
- Bösch, C.; Erb, B.; Kargl, F.; Kopp, H.; Pfattheicher, S. Tales from the Dark Side: Privacy Dark Strategies and Privacy Dark Patterns. Proc. Priv. Enhancing Technol. 2016, 4, 237–254. [Google Scholar] [CrossRef]
- Lazar, J.; Feng, J.H.; Hochheiser, H. Research Methods in Human-Computer Interaction; Morgan Kaufmann: Boston, MA, USA, 2017. [Google Scholar]
- Frobrukerrådet. Deceived by Design: How Tech Companies Use Dark Patterns to Discourage Us from Exercising Our Rights to Privacy; Frobrukerrådet: Oslo, Norway, 2018. [Google Scholar]
- Gray, C.M.; Kou, Y.; Battles, B.; Hoggatt, J.; Toombs, A.L. The Dark (Patterns) Side of UX Design. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (CHI ’18), Montreal, QC, Canada, 21–26 April 2018; ACM: New York, NY, USA, 2018; p. 14. [Google Scholar] [CrossRef]
- Hartzog, W. Privacy’s Blueprint: The Battle to Control the Design of New Technologies; Harvard University Press: Cambridge, MA, USA, 2018. [Google Scholar]
- Mathur, A.; Acar, G.; Friedman, M.J.; Lucherini, E.; Mayer, J.; Chetty, M.; Narayanan, A. Dark Patterns at Scale: Findings from a Crawl of 11K Shopping Websites. Proc. ACM Hum. Comput. Interact. 2019, 3, CSCW. [Google Scholar] [CrossRef]
- Warner, M.; Fischer, D. Senators Introduce Bipartisan Legislation to Ban Manipulative “Dark Patterns”. Available online: https://www.fischer.senate.gov/public/index.cfm/2019/4/senators-introduce-bipartisan-legislation-to-ban-manipulative-dark-patterns (accessed on 9 September 2020).
- Lacey, C.; Caudwell, C. Cuteness as a ‘Dark Pattern’ in Home Robots. In Proceedings of the 14th ACM/IEEE International Conference on Human-Robot Interaction (HRI ’19), Daegu, Korea, 11–14 March 2019; IEEE Press: Piscataway, NJ, USA, 2019; pp. 374–381. [Google Scholar]
- Utz, C.; Degeling, M.; Fahl, S.; Schaub, F.; Holz, T. (Un)Informed Consent: Studying GDPR Consent Notices in the Field. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, (CCS ’19), London, UK, 11–15 November 2019; Association for Computing Machinery: New York, NY, USA, 2019; pp. 973–990. [Google Scholar] [CrossRef]
- Tversky, A.; Kahneman, D. Prospect theory: An analysis of decision under risk. Econometrica 1979, 47, 263–291. [Google Scholar]
- Day, G.; Stemler, A. Are Dark Patterns Anticompetitive? Ala. Law Rev. 2020, 72, 1–45. [Google Scholar] [CrossRef]
- Di Geronimo, L.; Braz, L.; Fregnan, E.; Palomba, F.; Bacchelli, A. UI Dark Patterns and Where to Find Them: A Study on Mobile Applications and User Perception. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (CHI ’20), Honolulu, HI, USA, 25–30 April 2020; Association for Computing Machinery: New York, NY, USA, 2020; pp. 1–14. [Google Scholar] [CrossRef]
- Hurwitz, J. Designing a Pattern, darkly. NCJL Technol. 2020, 22, 57. [Google Scholar]
- Luguri, J.; Strahilevitz, L.J. Shining a Light on Dark Patterns. J. Leg. Anal. 2021, 13, 43–109. Available online: https://academic.oup.com/jla/article/13/1/43/6180579 (accessed on 28 May 2022). [CrossRef]
- Machuletz, D.; Böhme, R. Multiple purposes, multiple problems: A user study of consent dialogs after GDPR. Proc. Priv. Enhancing Technol. 2020, 2, 481–498. [Google Scholar] [CrossRef]
- Maier, M.; Harr, R. Dark Design Patterns: An End-User Perspective. Hum. Technol. 2020, 16, 170–199. [Google Scholar] [CrossRef]
- Narayanan, A.; Mathur, A.; Chetty, M.; Kshirsagar, M. Dark Patterns: Past, Present, and Future. Queue 2020, 18, 67–92. [Google Scholar] [CrossRef]
- Nouwens, M.; Liccardi, I.; Veale, M.; Karger, D.; Kagal, L. Dark Patterns after the GDPR: Scraping Consent Pop-Ups and Demonstrating Their Influence. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (CHI ’20), Honolulu, HI, USA, 25–30 April 2020; Association for Computing Machinery: New York, NY, USA, 2020; pp. 1–13. [Google Scholar] [CrossRef]
- Soe, T.H.; Nordberg, O.E.; Guribye, F.; Slavkovik, M. Circumvention by Design—Dark Patterns in Cookie Consent for Online News Outlets. In Proceedings of the 11th Nordic Conference on Human-Computer Interaction: Shaping Experiences, Shaping Society (NordiCHI ’20), Tallinn, Estonia, 25–29 October 2020; Association for Computing Machinery: New York, NY, USA, 2020; p. 12. [Google Scholar] [CrossRef]
- Waldman, A.E. Cognitive biases, dark patterns, and the ‘privacy paradox. Curr. Opin. Psychol. 2020, 31, 105–109. [Google Scholar] [CrossRef] [PubMed]
- Dark Patterns, the Tricks Websites Use to Make You Say Yes, Explained. Available online: https://vox.com/recode/22351108/dark-patterns-ui-web-design-privacy (accessed on 28 May 2022).
- Anderberg, M. Cluster Analysis for Applications; Academic Press: Cambridge, MA, USA, 1973. [Google Scholar]
- Kaufman, L.; Rousseeuw, P. Finding Groups in Data: An Introduction to Cluster Analysis; Wiley-Interscience: Hoboken, NJ, USA, 2005. [Google Scholar]
- Khan, S.S.; Ahmad, A. Cluster center initialization algorithm for kmeans clustering. Pattern Recognit. Lett. 2004, 25, 12931302. [Google Scholar]
- Jassbi, J.; Mohamadnejad, F.; Nasrollahzadeh, H. A Fuzzy DEMATEL framework for modeling cause and effect relationships of strategy map. Expert Syst. Appl. 2011, 38, 5967–5973. [Google Scholar]
- Chen, F.H.; Chi, D.-J. Application of a new DEMATEL to explore key factors of China’s corporate social responsibility: Evidence from accounting experts. Qual. Quant. 2015, 49, 135–154. [Google Scholar]
- Wu, H.H.; Chang, S.Y. A Case Study of Using DEMATEL Method to Identify Critical Factors in Green Supply Chain Management. Appl. Math. Comput. 2015, 256, 394–403. [Google Scholar]
- Khanam, S.; Siddiqui, J.; Talib, F. Modelling the TQM Enablers and IT Resources in the ICT Industry: An ISM-MICMAC Approach. Int. J. Inf. Syst. Manag. 2015, 1, 195–218. [Google Scholar] [CrossRef]
- Ahmad, A.; Dey, L. A k-mean clustering algorithm formixed numeric and categorical data. Data Knowl. Eng. 2007, 63, 503–527. [Google Scholar]
- Miyamoto, S.; Huynh, V.; Fujiwara, S. Methods for clustering categorical and mixed data: An overview and new algorithms. In Integrated Uncertainty in Knowledge Modelling and Decision Making; Spinger: Cham, Switzerland, 2018; pp. 75–86. [Google Scholar]
- Ahmad, A.; Dey, L. Algorithm for Fuzzy Clustering of Mixed Data with Numeric and Categorical Attributes; Springer: Berlin/Heidelberg, Germany, 2005; pp. 561–572. [Google Scholar]
- Zhanbayev, R.; Sagintayeva, S.; Ainur, A.; Nazarov, A. The Use of the Foresight Methods in Developing an Algorithm for Conducting Qualitative Examination of the Research Activities Results on the Example of the Republic of Kazakhstan. Mathematics 2020, 8, 2024. [Google Scholar]
- Nazarov, D.; Nazarov, A.; Kovtun, D. Building Technology and Predictive Analytics Models in the SAP Analytic Cloud Digital Service. In Proceedings of the 2020 IEEE 22nd Conference on Business Informatics (CBI), Antwerp, Belgium, 22–24 June 2020; Institute of Electrical and Electronics Engineers (IEEE): Piscataway, NJ, USA, 2020; Volume 2, pp. 106–110. [Google Scholar]
- Nazarov, D.M.; Morozova, A.S.; Kokovikhin, A.Y. SAP Analytic Cloud: A Tool for the Formation of Professional Competencies of Business Analyst. In Proceedings of the CEUR Workshop, St. Petersburg, Russia, 17–20 June 2020; p. 2570. [Google Scholar]
- Nazarov, D. Causality: Intelligent valuation models in the digital economy. Mathematics 2020, 8, 2174. [Google Scholar]
- Nazarov, D.M. Classification of models and description of trends in assessing the causality of relationships in socio-economic processes. Bus. Inform. 2020, 14, 47–61. [Google Scholar] [CrossRef]
Linguistic Variable | Value Interval [0;10] | Interval Midpoint | The Value of the Membership Function [0;1] |
---|---|---|---|
no sign of a dark pattern in the interface (Z) | 0 | 0 | 0 |
low presence of a dark pattern in the interface (L) | [2;4] | 3 | 0.3 |
uncertainty of finding a feature in a dark pattern (N) | 5 | 5 | 0.5 |
Continuation of Table 1. | |||
an influential presence of a dark pattern in the interface (H) | [6;10] | 8 | 0.8 |
a dark pattern is always present in the interface (F) | 10 | 10 | 1 |
Dark Patterns | Data Leak | Cost Increase | Complicated Interface | Hidden Advertising | Impossibility to Refuse | |
---|---|---|---|---|---|---|
1 | Trick questions (12) | 0.1 | 0.5 | 1 | 0 | 1 |
2 | Sneak into basket (14) | 0 | 1 | 0.8 | 0.1 | 0 |
3 | «Roach» motel (10) | 0.1 | 0.5 | 1 | 0 | 0.8 |
4 | Privacy zuckering (15) | 1 | 0 | 0.5 | 0.1 | 0.5 |
5 | Price comparison prevention (11) | 0 | 1 | 0.8 | 0.1 | 0 |
6 | Misdirection (14) | 0 | 1 | 0.8 | 0.5 | 0.1 |
7 | Hidden costs (15) | 0 | 1 | 0.8 | 0 | 0 |
8 | Bait and switch (17) | 0.1 | 0.5 | 1 | 0 | 1 |
9 | Confirmshaming (14) | 0.1 | 0.5 | 1 | 0.8 | 1 |
10 | Disguised ads (11) | 0.1 | 0.5 | 1 | 1 | 1 |
11 | Forced continuity (10) | 0 | 1 | 0.8 | 0.1 | 0.5 |
12 | «Friend» spam (12) | 1 | 0.1 | 0.5 | 0.1 | 0.5 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Nazarov, D.; Baimukhambetov, Y. Clustering of Dark Patterns in the User Interfaces of Websites and Online Trading Portals (E-Commerce). Mathematics 2022, 10, 3219. https://doi.org/10.3390/math10183219
Nazarov D, Baimukhambetov Y. Clustering of Dark Patterns in the User Interfaces of Websites and Online Trading Portals (E-Commerce). Mathematics. 2022; 10(18):3219. https://doi.org/10.3390/math10183219
Chicago/Turabian StyleNazarov, Dmitry, and Yerkebulan Baimukhambetov. 2022. "Clustering of Dark Patterns in the User Interfaces of Websites and Online Trading Portals (E-Commerce)" Mathematics 10, no. 18: 3219. https://doi.org/10.3390/math10183219
APA StyleNazarov, D., & Baimukhambetov, Y. (2022). Clustering of Dark Patterns in the User Interfaces of Websites and Online Trading Portals (E-Commerce). Mathematics, 10(18), 3219. https://doi.org/10.3390/math10183219