{"id":"https://openalex.org/W1990175024","doi":"https://doi.org/10.1145/2470654.2466246","title":"Benevolent deception in human computer interaction","display_name":"Benevolent deception in human computer interaction","publication_year":2013,"publication_date":"2013-04-27","ids":{"openalex":"https://openalex.org/W1990175024","doi":"https://doi.org/10.1145/2470654.2466246","mag":"1990175024"},"language":"en","primary_location":{"id":"doi:10.1145/2470654.2466246","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2470654.2466246","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064931337","display_name":"Eytan Adar","orcid":"https://orcid.org/0000-0003-1911-836X"},"institutions":[{"id":"https://openalex.org/I27837315","display_name":"University of Michigan\u2013Ann Arbor","ror":"https://ror.org/00jmfr291","country_code":"US","type":"education","lineage":["https://openalex.org/I27837315"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Eytan Adar","raw_affiliation_strings":["University of Michigan, Ann Arbor, Michigan, USA"],"affiliations":[{"raw_affiliation_string":"University of Michigan, Ann Arbor, Michigan, USA","institution_ids":["https://openalex.org/I27837315"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040526518","display_name":"Desney Tan","orcid":"https://orcid.org/0000-0003-2176-159X"},"institutions":[{"id":"https://openalex.org/I1290206253","display_name":"Microsoft (United States)","ror":"https://ror.org/00d0nc645","country_code":"US","type":"company","lineage":["https://openalex.org/I1290206253"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Desney S. Tan","raw_affiliation_strings":["Microsoft Research, Redmond, Washington, USA","Microsoft Research , Redmond , Washington , USA"],"affiliations":[{"raw_affiliation_string":"Microsoft Research, Redmond, Washington, USA","institution_ids":["https://openalex.org/I1290206253"]},{"raw_affiliation_string":"Microsoft Research , Redmond , Washington , USA","institution_ids":["https://openalex.org/I1290206253"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5032417423","display_name":"Jaime Teevan","orcid":"https://orcid.org/0000-0002-2786-0209"},"institutions":[{"id":"https://openalex.org/I1290206253","display_name":"Microsoft (United States)","ror":"https://ror.org/00d0nc645","country_code":"US","type":"company","lineage":["https://openalex.org/I1290206253"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jaime Teevan","raw_affiliation_strings":["Microsoft Research, Redmond, Washington, USA","Microsoft Research , Redmond , Washington , USA"],"affiliations":[{"raw_affiliation_string":"Microsoft Research, Redmond, Washington, USA","institution_ids":["https://openalex.org/I1290206253"]},{"raw_affiliation_string":"Microsoft Research , Redmond , Washington , USA","institution_ids":["https://openalex.org/I1290206253"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5064931337"],"corresponding_institution_ids":["https://openalex.org/I27837315"],"apc_list":null,"apc_paid":null,"fwci":6.9928,"has_fulltext":false,"cited_by_count":87,"citation_normalized_percentile":{"value":0.97086573,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1863","last_page":"1872"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10803","display_name":"Innovative Human-Technology Interaction","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1709","display_name":"Human-Computer Interaction"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10803","display_name":"Innovative Human-Technology Interaction","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1709","display_name":"Human-Computer Interaction"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/deception","display_name":"Deception","score":0.9720340967178345},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6139106154441833},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5620821118354797},{"id":"https://openalex.org/keywords/value","display_name":"Value (mathematics)","score":0.5593203902244568},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.4647570848464966},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3463653326034546},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.30260640382766724},{"id":"https://openalex.org/keywords/social-psychology","display_name":"Social psychology","score":0.28336870670318604}],"concepts":[{"id":"https://openalex.org/C2779267917","wikidata":"https://www.wikidata.org/wiki/Q170028","display_name":"Deception","level":2,"score":0.9720340967178345},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6139106154441833},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5620821118354797},{"id":"https://openalex.org/C2776291640","wikidata":"https://www.wikidata.org/wiki/Q2912517","display_name":"Value (mathematics)","level":2,"score":0.5593203902244568},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.4647570848464966},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3463653326034546},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.30260640382766724},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.28336870670318604},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/2470654.2466246","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2470654.2466246","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.303.677","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.303.677","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://research.microsoft.com/en-us/um/people/desney/publications/CHI2013-Deception.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.723.316","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.723.316","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.inf.ed.ac.uk/teaching/courses/cdi1/papers/adar2013.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.8100000023841858}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W154550395","https://openalex.org/W357231428","https://openalex.org/W1492766192","https://openalex.org/W1512483161","https://openalex.org/W1534254774","https://openalex.org/W1542305406","https://openalex.org/W1556089943","https://openalex.org/W1841352775","https://openalex.org/W1965680579","https://openalex.org/W1986173274","https://openalex.org/W1998515403","https://openalex.org/W2000969683","https://openalex.org/W2008411947","https://openalex.org/W2012724889","https://openalex.org/W2016721335","https://openalex.org/W2029709911","https://openalex.org/W2044772184","https://openalex.org/W2052417512","https://openalex.org/W2054623009","https://openalex.org/W2055453545","https://openalex.org/W2058258470","https://openalex.org/W2092795326","https://openalex.org/W2103854406","https://openalex.org/W2108743797","https://openalex.org/W2112278606","https://openalex.org/W2112709014","https://openalex.org/W2113427031","https://openalex.org/W2140365936","https://openalex.org/W2152127494","https://openalex.org/W2159266703","https://openalex.org/W2241115804","https://openalex.org/W2296358589","https://openalex.org/W2312754933","https://openalex.org/W2892140408","https://openalex.org/W2913265986","https://openalex.org/W6629224167"],"related_works":["https://openalex.org/W2165717120","https://openalex.org/W2039390456","https://openalex.org/W2948663225","https://openalex.org/W2029954793","https://openalex.org/W1992683634","https://openalex.org/W4295295666","https://openalex.org/W1978059949","https://openalex.org/W2512387791","https://openalex.org/W70044515","https://openalex.org/W2128448209"],"abstract_inverted_index":{"Though":[0],"it":[1],"has":[2,36],"been":[3],"asserted":[4],"that":[5,90,101,112],"\"good":[6],"design":[7],"is":[8,50,138],"honest\",":[9],"[42]":[10],"deception":[11,25,49,63],"exists":[12],"throughout":[13],"human-computer":[14],"interaction":[15],"research":[16,34,115],"and":[17,44,82,99,108],"practice.":[18],"Because":[19],"of":[20,60,97,136],"the":[21,33,58,67,72],"stigma":[22],"associated":[23],"with":[24,94,106],"-":[26,32],"in":[27,47,85,122],"many":[28],"cases":[29],"rightfully":[30],"so":[31],"community":[35],"focused":[37],"its":[38],"energy":[39],"on":[40],"eradicating":[41],"malicious":[42],"deception,":[43,62],"ignored":[45],"instances":[46],"which":[48],"positively":[51],"employed.":[52],"In":[53],"this":[54,91],"paper":[55,125],"we":[56],"present":[57],"notion":[59],"benevolent":[61],"aimed":[64],"at":[65],"benefitting":[66],"user":[68],"as":[69,71,119],"well":[70],"developer.":[73],"We":[74,88],"frame":[75],"our":[76],"discussion":[77],"using":[78],"a":[79,95],"criminology-inspired":[80],"model":[81],"ground":[83],"components":[84],"various":[86],"examples.":[87],"assert":[89],"provides":[92],"us":[93,105],"set":[96],"tools":[98],"principles":[100],"not":[102],"only":[103],"helps":[104],"system":[107],"interface":[109],"design,":[110],"but":[111],"opens":[113],"new":[114],"areas.":[116],"After":[117],"all,":[118],"Cockton":[120],"claims":[121],"his":[123],"2004":[124],"\"Value-Centered":[126],"HCI\"":[127],"[13],":[128],"\"Traditional":[129],"disciplines":[130],"have":[131],"delivered":[132],"truth.":[133],"The":[134],"goal":[135],"HCI":[137],"to":[139],"deliver":[140],"value.\"":[141]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":20},{"year":2020,"cited_by_count":5},{"year":2019,"cited_by_count":7},{"year":2018,"cited_by_count":6},{"year":2017,"cited_by_count":4},{"year":2016,"cited_by_count":7},{"year":2015,"cited_by_count":7},{"year":2014,"cited_by_count":4},{"year":2013,"cited_by_count":4}],"updated_date":"2026-04-14T08:04:32.555800","created_date":"2025-10-10T00:00:00"}
