{"id":"https://openalex.org/W7106003351","doi":"https://doi.org/10.14763/2025.4.2047","title":"Leveraging interdisciplinary methods for evidence collection in enforcement: Dark patterns as a case study","display_name":"Leveraging interdisciplinary methods for evidence collection in enforcement: Dark patterns as a case study","publication_year":2025,"publication_date":"2025-11-18","ids":{"openalex":"https://openalex.org/W7106003351","doi":"https://doi.org/10.14763/2025.4.2047"},"language":"en","primary_location":{"id":"doi:10.14763/2025.4.2047","is_oa":true,"landing_page_url":"https://doi.org/10.14763/2025.4.2047","pdf_url":"https://policyreview.info/pdf/policyreview-2025-4-2047.pdf","source":{"id":"https://openalex.org/S4210177192","display_name":"Internet Policy Review","issn_l":"2197-6775","issn":["2197-6775"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313659","host_organization_name":"Alexander von Humboldt Institute for Internet and Society","host_organization_lineage":["https://openalex.org/P4310313659"],"host_organization_lineage_names":["Alexander von Humboldt Institute for Internet and Society"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Internet Policy Review","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://policyreview.info/pdf/policyreview-2025-4-2047.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Johanna Gunawan","orcid":null},"institutions":[{"id":"https://openalex.org/I34352273","display_name":"Maastricht University","ror":"https://ror.org/02jz4aj89","country_code":"NL","type":"education","lineage":["https://openalex.org/I34352273"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Johanna Gunawan","raw_affiliation_strings":["Maastricht University Indiana University University of Utrecht Nataliia Bielova Universit Cte d' Azur"],"affiliations":[{"raw_affiliation_string":"Maastricht University Indiana University University of Utrecht Nataliia Bielova Universit Cte d' Azur","institution_ids":["https://openalex.org/I34352273"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Colin M. Gray","orcid":null},"institutions":[{"id":"https://openalex.org/I34352273","display_name":"Maastricht University","ror":"https://ror.org/02jz4aj89","country_code":"NL","type":"education","lineage":["https://openalex.org/I34352273"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Colin M. Gray","raw_affiliation_strings":["Maastricht University Indiana University University of Utrecht Nataliia Bielova Universit Cte d' Azur"],"affiliations":[{"raw_affiliation_string":"Maastricht University Indiana University University of Utrecht Nataliia Bielova Universit Cte d' Azur","institution_ids":["https://openalex.org/I34352273"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Cristiana Santos","orcid":null},"institutions":[{"id":"https://openalex.org/I34352273","display_name":"Maastricht University","ror":"https://ror.org/02jz4aj89","country_code":"NL","type":"education","lineage":["https://openalex.org/I34352273"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Cristiana Santos","raw_affiliation_strings":["Maastricht University Indiana University University of Utrecht Nataliia Bielova Universit Cte d' Azur"],"affiliations":[{"raw_affiliation_string":"Maastricht University Indiana University University of Utrecht Nataliia Bielova Universit Cte d' Azur","institution_ids":["https://openalex.org/I34352273"]}]},{"author_position":"last","author":{"id":null,"display_name":"Nataliia Bielova","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Nataliia Bielova","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I34352273"],"apc_list":null,"apc_paid":null,"fwci":7.5607,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.97229123,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"14","issue":"4","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.15449999272823334,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.15449999272823334,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10883","display_name":"Ethics and Social Impacts of AI","score":0.11180000007152557,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10799","display_name":"Data Visualization and Analytics","score":0.04740000143647194,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/enforcement","display_name":"Enforcement","score":0.558899998664856},{"id":"https://openalex.org/keywords/autonomy","display_name":"Autonomy","score":0.546500027179718},{"id":"https://openalex.org/keywords/great-rift","display_name":"Great Rift","score":0.503600001335144},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.38589999079704285},{"id":"https://openalex.org/keywords/best-practice","display_name":"Best practice","score":0.3781000077724457},{"id":"https://openalex.org/keywords/law-enforcement","display_name":"Law enforcement","score":0.3515999913215637},{"id":"https://openalex.org/keywords/social-network-analysis","display_name":"Social network analysis","score":0.3262999951839447},{"id":"https://openalex.org/keywords/behavioural-sciences","display_name":"Behavioural sciences","score":0.31189998984336853}],"concepts":[{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.558899998664856},{"id":"https://openalex.org/C65414064","wikidata":"https://www.wikidata.org/wiki/Q484105","display_name":"Autonomy","level":2,"score":0.546500027179718},{"id":"https://openalex.org/C99394141","wikidata":"https://www.wikidata.org/wiki/Q1085203","display_name":"Great Rift","level":2,"score":0.503600001335144},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.4675999879837036},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.38589999079704285},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.3806000053882599},{"id":"https://openalex.org/C184356942","wikidata":"https://www.wikidata.org/wiki/Q830382","display_name":"Best practice","level":2,"score":0.3781000077724457},{"id":"https://openalex.org/C55587333","wikidata":"https://www.wikidata.org/wiki/Q1133029","display_name":"Engineering ethics","level":1,"score":0.36039999127388},{"id":"https://openalex.org/C2780262971","wikidata":"https://www.wikidata.org/wiki/Q44554","display_name":"Law enforcement","level":2,"score":0.3515999913215637},{"id":"https://openalex.org/C114713312","wikidata":"https://www.wikidata.org/wiki/Q7551269","display_name":"Social network analysis","level":3,"score":0.3262999951839447},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.3181999921798706},{"id":"https://openalex.org/C539667460","wikidata":"https://www.wikidata.org/wiki/Q2414942","display_name":"Management science","level":1,"score":0.31630000472068787},{"id":"https://openalex.org/C5570062","wikidata":"https://www.wikidata.org/wiki/Q3919817","display_name":"Behavioural sciences","level":2,"score":0.31189998984336853},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.30970001220703125},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.3003999888896942},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.2921999990940094},{"id":"https://openalex.org/C525770307","wikidata":"https://www.wikidata.org/wiki/Q1266051","display_name":"Dark triad","level":4,"score":0.29100000858306885},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.289900004863739},{"id":"https://openalex.org/C2781083858","wikidata":"https://www.wikidata.org/wiki/Q17327049","display_name":"Scientific literature","level":2,"score":0.28679999709129333},{"id":"https://openalex.org/C2776876444","wikidata":"https://www.wikidata.org/wiki/Q2845200","display_name":"Crime analysis","level":2,"score":0.2842999994754791},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.27970001101493835},{"id":"https://openalex.org/C2776889888","wikidata":"https://www.wikidata.org/wiki/Q1135789","display_name":"Unintended consequences","level":2,"score":0.27810001373291016},{"id":"https://openalex.org/C133462117","wikidata":"https://www.wikidata.org/wiki/Q4929239","display_name":"Data collection","level":2,"score":0.2711000144481659},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.2635999917984009},{"id":"https://openalex.org/C2780791683","wikidata":"https://www.wikidata.org/wiki/Q846785","display_name":"Action (physics)","level":2,"score":0.25099998712539673}],"mesh":[],"locations_count":5,"locations":[{"id":"doi:10.14763/2025.4.2047","is_oa":true,"landing_page_url":"https://doi.org/10.14763/2025.4.2047","pdf_url":"https://policyreview.info/pdf/policyreview-2025-4-2047.pdf","source":{"id":"https://openalex.org/S4210177192","display_name":"Internet Policy Review","issn_l":"2197-6775","issn":["2197-6775"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313659","host_organization_name":"Alexander von Humboldt Institute for Internet and Society","host_organization_lineage":["https://openalex.org/P4310313659"],"host_organization_lineage_names":["Alexander von Humboldt Institute for Internet and Society"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Internet Policy Review","raw_type":"journal-article"},{"id":"pmh:oai:cris.maastrichtuniversity.nl:openaire/4fb630f8-4976-4d64-b144-958a00e9eee1","is_oa":true,"landing_page_url":"https://cris.maastrichtuniversity.nl/en/publications/4fb630f8-4976-4d64-b144-958a00e9eee1","pdf_url":null,"source":{"id":"https://openalex.org/S4306402616","display_name":"Research Publications (Maastricht University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I34352273","host_organization_name":"Maastricht University","host_organization_lineage":["https://openalex.org/I34352273"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Gunawan, J, Gray, C M, Santos, C & Bielova, N 2025, 'Leveraging interdisciplinary methods for evidence collection in enforcement : Dark patterns as a case study', Internet Policy Review, vol. 14, no. 4, 2047, pp. 1-33. https://doi.org/10.14763/2025.4.2047","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:HAL:hal-05473920v1","is_oa":true,"landing_page_url":"https://hal.science/hal-05473920","pdf_url":null,"source":{"id":"https://openalex.org/S4406922466","display_name":"SPIRE - Sciences Po Institutional REpository","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Internet Policy Review, 2025, 14 (4), &#x27E8;10.14763/2025.4.2047&#x27E9;","raw_type":"Journal articles"},{"id":"pmh:oai:doaj.org/article:50d7a81d99884059917d143abeef5b80","is_oa":true,"landing_page_url":"https://doaj.org/article/50d7a81d99884059917d143abeef5b80","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Internet Policy Review, Vol 14, Iss 4 (2025)","raw_type":"article"},{"id":"pmh:oai:dspace.library.uu.nl:1874/479958","is_oa":true,"landing_page_url":"https://dspace.library.uu.nl/handle/1874/479958","pdf_url":null,"source":{"id":"https://openalex.org/S4306401649","display_name":"Utrecht University Repository (Utrecht University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I193662353","host_organization_name":"Utrecht University","host_organization_lineage":["https://openalex.org/I193662353"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"}],"best_oa_location":{"id":"doi:10.14763/2025.4.2047","is_oa":true,"landing_page_url":"https://doi.org/10.14763/2025.4.2047","pdf_url":"https://policyreview.info/pdf/policyreview-2025-4-2047.pdf","source":{"id":"https://openalex.org/S4210177192","display_name":"Internet Policy Review","issn_l":"2197-6775","issn":["2197-6775"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310313659","host_organization_name":"Alexander von Humboldt Institute for Internet and Society","host_organization_lineage":["https://openalex.org/P4310313659"],"host_organization_lineage_names":["Alexander von Humboldt Institute for Internet and Society"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Internet Policy Review","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4731955730","display_name":null,"funder_award_id":"1909714","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G7678337528","display_name":null,"funder_award_id":"ANR 22-PECY-0002","funder_id":"https://openalex.org/F4320320883","funder_display_name":"Agence Nationale de la Recherche"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320320883","display_name":"Agence Nationale de la Recherche","ror":"https://ror.org/00rbzpz17"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7106003351.pdf","grobid_xml":"https://content.openalex.org/works/W7106003351.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"\u201cDark":[0],"patterns\u201d":[1],"are":[2],"manipulative,":[3],"deceptive":[4],"design":[5,43],"practices":[6],"deployed":[7],"in":[8],"online":[9],"services":[10],"to":[11,71,86,161,189,202],"influence":[12,96],"users\u2019":[13],"decisions":[14],"towards":[15,133],"undesired":[16],"or":[17],"negative":[18],"outcomes.":[19],"Interdisciplinary":[20],"by":[21,165],"nature,":[22],"dark":[23,76,107,157],"patterns":[24,108,158],"implicate":[25],"concepts":[26],"of":[27,55,75],"autonomy":[28],"and":[29,38,42,44,51,58,92,127,129,140,151,171,179,181,187],"choice":[30],"from":[31,35,48,148,156],"law,":[32,128],"human":[33],"behaviour":[34],"the":[36,73,117,175],"psychology":[37],"social":[39],"science":[40],"disciplines,":[41],"human-computer":[45],"interaction":[46],"(HCI)":[47],"technical":[49],"fields":[50],"industry.":[52],"A":[53],"body":[54],"enforcement":[56,159],"actions":[57],"regulatory":[59,81,97],"fines":[60],"worldwide":[61],"as":[62,154,199],"discussed":[63],"within":[64],"this":[65,80],"article":[66],"comprise":[67],"a":[68,110],"growing":[69],"effort":[70],"minimise":[72],"impact":[74],"patterns.":[77],"However,":[78],"despite":[79],"momentum,":[82],"it":[83],"remains":[84],"unknown":[85],"what":[87],"extent":[88],"scientific":[89],"research":[90],"methods":[91,147,163,198],"evidence":[93],"types":[94],"may":[95],"decisions,":[98],"which":[99],"is":[100],"relevant":[101],"for":[102,113,135,173,184],"effective":[103],"evidence-based":[104],"enforcement.As":[105],"such,":[106],"present":[109],"case":[111],"study":[112],"reflecting":[114],"upon":[115],"narrowing":[116],"academic-enforcement":[118],"divide.":[119],"Our":[120],"team":[121],"spans":[122],"design,":[123],"HCI,":[124],"computer":[125],"science,":[126],"examines":[130],"investigatory":[131,146],"methodologies":[132],"insight":[134],"strengthening":[136],"collaboration":[137],"between":[138,177],"scholars":[139,186],"regulators.":[141],"This":[142],"interdisciplinary":[143],"work":[144],"considers":[145],"both":[149,166,185],"academia":[150],"industry,":[152],"then":[153],"inferred":[155],"cases":[160],"relate":[162],"used":[164],"groups.":[167],"We":[168,193],"discuss":[169],"challenges":[170],"opportunities":[172],"tightening":[174],"gap":[176],"researchers":[178],"regulators,":[180],"propose":[182],"suggestions":[183],"enforcers":[188],"tighten":[190],"feedback":[191],"loops.":[192],"additionally":[194],"highlight":[195],"informal":[196],"investigation":[197],"an":[200],"opportunity":[201],"strengthen":[203],"collaboration.":[204]},"counts_by_year":[{"year":2026,"cited_by_count":2}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-11-19T00:00:00"}
