"We Wanted to Do Better Than the Law": Exploring UI/UX Designers' Privacy Advocacy in Practice
Pith reviewed 2026-05-08 02:02 UTC · model grok-4.3
The pith
UI/UX designers who advocate for privacy navigate personal values, team negotiations, and business pressures through adaptive strategies.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
Through semi-structured interviews, the study establishes that personal and contextual factors shape designers' valuation of privacy, that the challenges of prioritizing privacy are collaborative and arise in negotiations with other stakeholders, and that designers navigate resulting tensions between business goals, team dynamics, and technical development by using adaptive methods to maintain privacy focus.
What carries the argument
Designers' adaptive methods for negotiating privacy priorities within cross-functional teams facing business, team, and technical constraints.
If this is right
- A user-centered approach is needed to support privacy-aware design.
- Organizational-level changes can reduce barriers to privacy prioritization.
- Designer-centric tools can bridge knowledge gaps between designers and privacy requirements.
- Community building among designers can strengthen privacy advocacy efforts.
Where Pith is reading between the lines
- The reported negotiation tactics could be turned into targeted training modules for design teams.
- Similar interview studies with developers and product managers might reveal whether the same tensions appear from other roles.
- The findings suggest that privacy tools should focus on facilitating cross-team discussions rather than solely on technical compliance.
Load-bearing premise
The experiences reported by twelve self-selected privacy-advocating designers accurately represent the range of practices and can guide general recommendations for supporting privacy-aware design.
What would settle it
A broader survey of UI/UX designers finding that most do not report personal or contextual influences on privacy values, do not face collaborative challenges, or do not use adaptive methods would undermine the central claims.
Figures
read the original abstract
Designers hold primary responsibility for shaping the user interface (UI) and user experience (UX) of a product. This role goes beyond aesthetics and usability, extending to the privacy outcomes of user experience, which often emerge through collaboration with other stakeholders such as developers, product managers, and marketing teams. Previous studies on enhancing privacy for technological products primarily focused on the roles of developers -- understanding their needs and challenges -- but limited effort is devoted to examining how UI/UX designers consider and approach privacy in their work. Through 12 semi-structured interviews with privacy-advocating UI/UX designers, we explore the perceptions, influencing factors, challenges, and adaptive methods they use regarding privacy implementation. We pay special attention to how these challenges and adaptations play out in team-based settings where decisions are negotiated together. Our study reveals how personal and contextual factors shape designers' value of privacy, the collaborative nature of the challenges designers face when trying to prioritize privacy, and how they navigate tensions between business goals, team dynamics, and technical development. Based on our findings, we discuss implications for advocating a user-centered approach for supporting privacy-aware design, suggestions for organizational-level changes and bridging knowledge gaps through designer-centric tools and community building.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The manuscript reports results from 12 semi-structured interviews with privacy-advocating UI/UX designers. It describes how personal and contextual factors shape designers' valuation of privacy, the collaborative challenges that arise when attempting to prioritize privacy in team settings with developers, product managers, and other stakeholders, and the adaptive strategies designers use to navigate tensions between privacy goals, business objectives, team dynamics, and technical development. The paper concludes with implications for user-centered support of privacy-aware design, organizational changes, designer-centric tools, and community building.
Significance. If the themes hold after methodological strengthening, the work usefully extends privacy research in HCI beyond its predominant focus on developers by documenting designers' advocacy practices and team-based negotiations. The emphasis on collaborative challenges and adaptive methods is a concrete contribution that could inform practical interventions, though the purposive sample restricts the scope of any general recommendations.
major comments (2)
- [Methods] Methods: The manuscript provides no details on the recruitment channels, screening criteria, participant demographics (beyond the privacy-advocacy filter), interview protocol, or the thematic analysis process (e.g., codebook development, saturation criteria, or how quotes were selected). These omissions are load-bearing because the central claims about personal/contextual factors, collaborative challenges, and navigation strategies rest entirely on the interpretive steps applied to the 12 transcripts.
- [Findings and Discussion] Findings and Discussion: The reported themes and implications for organizational changes and designer-centric tools are derived exclusively from a purposive sample of self-identified privacy advocates. The manuscript does not present evidence or discussion of how these patterns might differ (or be absent) among designers who do not prioritize privacy, which directly limits the defensibility of extrapolating the observed tensions and adaptations to typical UI/UX practice.
minor comments (1)
- [Abstract] Abstract: The claim that the study 'reveals how personal and contextual factors shape designers' value of privacy' would be clearer if the abstract briefly noted the sample's advocacy orientation rather than presenting the findings as broadly representative of designers.
Simulated Author's Rebuttal
We thank the referee for the constructive feedback on methodological transparency and the scope of our claims. We address each major comment below and will revise the manuscript accordingly.
read point-by-point responses
-
Referee: [Methods] Methods: The manuscript provides no details on the recruitment channels, screening criteria, participant demographics (beyond the privacy-advocacy filter), interview protocol, or the thematic analysis process (e.g., codebook development, saturation criteria, or how quotes were selected). These omissions are load-bearing because the central claims about personal/contextual factors, collaborative challenges, and navigation strategies rest entirely on the interpretive steps applied to the 12 transcripts.
Authors: We agree that the current Methods section lacks necessary detail for transparency and replicability. In the revised manuscript we will expand it to describe: recruitment channels (LinkedIn groups, design Slack communities, and privacy-focused forums), screening criteria (self-identification as privacy advocates plus minimum years of professional experience), a full demographics table, the complete semi-structured interview guide with example questions, and the thematic analysis procedure including iterative codebook development, saturation criteria, and rationale for quote selection. These additions directly address the load-bearing concern. revision: yes
-
Referee: [Findings and Discussion] Findings and Discussion: The reported themes and implications for organizational changes and designer-centric tools are derived exclusively from a purposive sample of self-identified privacy advocates. The manuscript does not present evidence or discussion of how these patterns might differ (or be absent) among designers who do not prioritize privacy, which directly limits the defensibility of extrapolating the observed tensions and adaptations to typical UI/UX practice.
Authors: The study was deliberately designed with a purposive sample of privacy advocates to surface the specific practices, values, and negotiation strategies of designers who actively work beyond legal minimums; this focus is stated in the abstract, introduction, and research questions. We do not claim generalizability to all UI/UX designers. In revision we will add an explicit Limitations subsection that (a) reiterates the purposive nature of the sample, (b) notes the absence of comparative data from non-advocates, and (c) frames the implications for tools and organizational change as supports that could amplify advocacy rather than universal prescriptions. Future comparative work is identified as needed. revision: partial
Circularity Check
No circularity: claims derive directly from interview data
full rationale
This is a qualitative interview study with no equations, parameters, predictions, or derivations. The central claims about designers' privacy values, collaborative challenges, and navigation of tensions are presented as emerging from thematic analysis of the 12 semi-structured interviews. No step reduces by construction to a fitted input, self-citation chain, or renamed ansatz; the paper is self-contained against its own described data collection and analysis process.
Axiom & Free-Parameter Ledger
axioms (1)
- domain assumption UI/UX designers hold primary responsibility for shaping privacy outcomes through collaboration with other stakeholders
Reference graph
Works this paper leans on
-
[1]
Hazim Almuhimedi, Florian Schaub, Norman Sadeh, Idris Adjerid, Alessandro Acquisti, Joshua Gluck, Lorrie Faith Cranor, and Yuvraj Agarwal. 2015. Your Location has been Shared 5,398 Times! A Field Study on Mobile App Privacy , Vol. 1, No. 1, Article . Publication date: April 2026. 16 Keyu Yao, Jinghui Cheng, and Jin L.C. Guo Nudging. InProceedings of the 3...
-
[2]
Vinícius Camargo Andrade, Rhodrigo Deda Gomes, Sheila Reinehr, Cinthia Obladen De Almendra Freitas, and Andreia Malucelli. 2023. Privacy by Design and Software Engineering: a Systematic Literature Review. InProceedings of the XXI Brazilian Symposium on Software Quality(Curitiba, Brazil)(SBQS ’22). Association for Computing Machinery, New York, NY, USA, Ar...
-
[3]
Florian Bemmann, Helena Stoll, and Sven Mayer. 2024. Privacy Slider: Fine-Grain Privacy Control for Smartphones. Proc. ACM Hum.-Comput. Interact.8, MHCI, Article 272 (Sept. 2024), 31 pages. doi:10.1145/3676519
-
[4]
Alexander Bleier, Avi Goldfarb, and Catherine Tucker. 2020. Consumer privacy and the future of data-based innovation and marketing.International Journal of Research in Marketing37, 3 (2020), 466–480. doi:10.1016/j.ijresmar.2020.03.006
-
[5]
2021.Thematic analysis
Virginia Braun and Victoria Clarke. 2021.Thematic analysis. SAGE Publications, London, England
2021
-
[6]
Office of the Attorney General California Department of Justice. 2024. California Consumer Privacy Act (CCPA). https://oag.ca.gov/privacy/ccpa. Accessed: 2024-03-13
2024
-
[7]
Evan Caragay, Katherine Xiong, Jonathan Zong, and Daniel Jackson. 2024. Beyond Dark Patterns: A Concept-Based Framework for Ethical Software Design. InProceedings of the 2024 CHI Conference on Human Factors in Computing Systems(Honolulu, HI, USA)(CHI ’24). Association for Computing Machinery, New York, NY, USA, Article 291, 16 pages. doi:10.1145/3613904.3642781
-
[8]
George Chalhoub and Ivan Flechais. 2022. Data Protection at a Discount: Investigating the UX of Data Protection from User, Designer, and Business Leader Perspectives.Proc. ACM Hum.-Comput. Interact.6, CSCW2, Article 436 (Nov. 2022), 36 pages. doi:10.1145/3555537
-
[9]
Shruthi Sai Chivukula, Colin Gray, Ziqing Li, Anne C. Pivonka, and Jingning Chen. 2024. Surveying a Landscape of Ethics-Focused Design Methods.ACM J. Responsib. Comput.1, 3, Article 22 (Sept. 2024), 32 pages. doi:10.1145/3678988
-
[10]
Shruthi Sai Chivukula, Chris Rhys Watkins, Rhea Manocha, Jingle Chen, and Colin M. Gray. 2020. Dimensions of UX Practice that Shape Ethical Awareness. InProceedings of the 2020 CHI Conference on Human Factors in Computing Systems(Honolulu, HI, USA)(CHI ’20). Association for Computing Machinery, New York, NY, USA, 1–13. doi:10.1145/ 3313831.3376459
-
[11]
Michael Colesky, Jaap-Henk Hoepman, and Christiaan Hillen. 2016. A Critical Analysis of Privacy Design Strategies. In2016 IEEE Security and Privacy Workshops (SPW). IEEE Computer Society, 33–40. doi:10.1109/SPW.2016.23
-
[12]
2023.Bill C-27: Consumer Privacy Protection Act
Department of Justice Canada. 2023.Bill C-27: Consumer Privacy Protection Act. Technical Report. Government of Canada. https://www.justice.gc.ca/eng/csj-sjc/pl/charter-charte/c27_1.html
2023
-
[13]
Verena Distler, Gabriele Lenzini, Carine Lallemand, and Vincent Koenig. 2021. The Framework of Security-Enhancing Friction: How UX Can Help Users Behave More Securely. InProceedings of the New Security Paradigms Workshop 2020 (Online, USA)(NSPW ’20). Association for Computing Machinery, New York, NY, USA, 45–58. doi:10.1145/3442167. 3442173
-
[14]
European Parliament and Council of the European Union. 2016. General Data Protection Regulation. https://gdpr- info.eu
2016
-
[15]
Batya Friedman. 1996. Value-sensitive design.interactions3, 6 (1996), 16–23
1996
-
[16]
Gray and Shruthi Sai Chivukula
Colin M. Gray and Shruthi Sai Chivukula. 2019. Ethical Mediation in UX Practice. InProceedings of the 2019 CHI Conference on Human Factors in Computing Systems(Glasgow, Scotland Uk)(CHI ’19). Association for Computing Machinery, New York, NY, USA, 1–11. doi:10.1145/3290605.3300408
-
[17]
Colin M. Gray, Shruthi Sai Chivukula, and Ahreum Lee. 2020. What Kind of Work Do "Asshole Designers" Create? Describing Properties of Ethical Concern on Reddit. InProceedings of the 2020 ACM Designing Interactive Systems Conference(Eindhoven, Netherlands)(DIS ’20). Association for Computing Machinery, New York, NY, USA, 61–73. doi:10.1145/3357236.3395486
-
[18]
Gray, Yubo Kou, Bryan Battles, Joseph Hoggatt, and Austin L
Colin M. Gray, Yubo Kou, Bryan Battles, Joseph Hoggatt, and Austin L. Toombs. 2018. The Dark (Patterns) Side of UX Design. InProceedings of the 2018 CHI Conference on Human Factors in Computing Systems(Montreal QC, Canada)(CHI ’18). Association for Computing Machinery, New York, NY, USA, 1–14. doi:10.1145/3173574.3174108
-
[19]
Johanna Gunawan, Amogh Pradeep, David Choffnes, Woodrow Hartzog, and Christo Wilson. 2021. A Comparative Study of Dark Patterns Across Web and Mobile Modalities.Proc. ACM Hum.-Comput. Interact.5, CSCW2, Article 377 (Oct. 2021), 29 pages. doi:10.1145/3479521
-
[20]
Irit Hadar, Tomer Hasson, Oshrat Ayalon, Eran Toch, Michael Birnhack, Sofia Sherman, and Arod Balissa. 2018. Privacy by designers: software developers’privacy mindset.Empirical Software Engineering23, 1 (2018), 259–289. doi:10.1007/s10664-017-9517-1
-
[21]
Those things are written by lawyers, and programmers are reading that
Stefan Albert Horstmann, Samuel Domiks, Marco Gutfleisch, Mindy Tran, Yasemin Acar, Veelasha Moonsamy, and Alena Naiakshina. 2024. “Those things are written by lawyers, and programmers are reading that. ” Mapping the Communication Gap Between Software Developers and Privacy Experts.Proc. Priv. Enhancing Technol.2024, 1 (2024), 151–170. doi:10.56553/POPETS...
-
[22]
Alexander Jones and Volker Thoma and. 2019. Determinants for Successful Agile Collaboration between UX Designers and Software Developers in a Complex Organisation.International Journal of Human–Computer Interaction35, 20 (2019), 1914–1935. doi:10.1080/10447318.2019.1587856
-
[23]
Spyros Kokolakis. 2017. Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon.Computers & Security64 (2017), 122–134. doi:10.1016/j.cose.2015.07.002
-
[24]
David Leimstädtner, Peter Sörries, and Claudia Müller-Birn. 2023. Investigating Responsible Nudge Design for Informed Decision-Making Enabling Transparent and Reflective Decision-Making. InProceedings of Mensch Und Computer 2023(Rapperswil, Switzerland)(MuC ’23). Association for Computing Machinery, New York, NY, USA, 220–236. doi:10.1145/3603555.3603567
-
[25]
Germán Leiva, Nolwenn Maudet, Wendy Mackay, and Michel Beaudouin-Lafon. 2019. Enact: Reducing De- signer–Developer Breakdowns When Prototyping Custom Interactions.ACM Trans. Comput.-Hum. Interact.26, 3, Article 19 (May 2019), 48 pages. doi:10.1145/3310276
-
[26]
Lanjing Liu, Xiaozheng Wang, Shaddi Hasan, and Yaxing Yao. 2025. Co-Design Privacy Notice and Controls with Children. InProceedings of the Extended Abstracts of the CHI Conference on Human Factors in Computing Systems (CHI EA ’25). Association for Computing Machinery, New York, NY, USA, Article 137, 7 pages. doi:10.1145/3706599.3719886
-
[27]
Yuwen Lu, Chao Zhang, Yuewen Yang, Yaxing Yao, and Toby Jia-Jun Li. 2024. From Awareness to Action: Exploring End-User Empowerment Interventions for Dark Patterns in UX.Proc. ACM Hum.-Comput. Interact.8, CSCW1, Article 59 (April 2024), 41 pages. doi:10.1145/3637336
-
[28]
Arunesh Mathur, Gunes Acar, Michael J. Friedman, Eli Lucherini, Jonathan Mayer, Marshini Chetty, and Arvind Narayanan. 2019. Dark Patterns at Scale: Findings from a Crawl of 11K Shopping Websites.Proc. ACM Hum.-Comput. Interact.3, CSCW, Article 81 (Nov. 2019), 32 pages. doi:10.1145/3359183
-
[29]
Arunesh Mathur, Mihir Kshirsagar, and Jonathan Mayer. 2021. What Makes a Dark Pattern... Dark? Design Attributes, Normative Considerations, and Measurement Methods. InProceedings of the 2021 CHI Conference on Human Factors in Computing Systems(Yokohama, Japan)(CHI ’21). Association for Computing Machinery, New York, NY, USA, Article 360, 18 pages. doi:10....
-
[30]
Nick Merrill. 2020. Security Fictions: Bridging Speculative Design and Computer Security. InProceedings of the 2020 ACM Designing Interactive Systems Conference(Eindhoven, Netherlands)(DIS ’20). Association for Computing Machinery, New York, NY, USA, 1727–1735. doi:10.1145/3357236.3395451
-
[31]
Arvind Narayanan, Arunesh Mathur, Marshini Chetty, and Mihir Kshirsagar. 2020. Dark Patterns: Past, Present, and Future: The evolution of tricky user interfaces.Queue18, 2 (May 2020), 67–92. doi:10.1145/3400899.3400901
-
[32]
Midas Nouwens, Ilaria Liccardi, Michael Veale, David Karger, and Lalana Kagal. 2020. Dark Patterns after the GDPR: Scraping Consent Pop-ups and Demonstrating their Influence. InProceedings of the 2020 CHI Conference on Human Factors in Computing Systems(Honolulu, HI, USA)(CHI ’20). Association for Computing Machinery, New York, NY, USA, 1–13. doi:10.1145/...
-
[33]
Leysan Nurgalieva, Alisa Frik, and Gavin Doherty. 2023. A Narrative Review of Factors Affecting the Implementation of Privacy and Security Practices in Software Development.ACM Comput. Surv.55, 14s, Article 320 (July 2023), 27 pages. doi:10.1145/3589951
-
[34]
Hernan Palombo, Armin Ziaie Tabari, Daniel Lende, Jay Ligatti, and Xinming Ou. 2020. An ethnographic understanding of software (in) security and a co-creation model to improve secure software development. InProceedings of the Sixteenth USENIX Conference on Usable Privacy and Security (SOUPS’20). USENIX Association, USA, Article 12, 16 pages. https://dl.ac...
-
[35]
Emmanouil Papadogiannakis, Panagiotis Papadopoulos, Nicolas Kourtellis, and Evangelos P. Markatos. 2021. User Tracking in the Post-cookie Era: How Websites Bypass GDPR Consent to Track Users. InProceedings of the Web Con- ference 2021(Ljubljana, Slovenia)(WWW ’21). Association for Computing Machinery, New York, NY, USA, 2130–2141. doi:10.1145/3442381.3450056
-
[36]
It doesn’t just feel like something a lawyer slapped together
Rizu Paudel, Ankit Shrestha, Prakriti Dumaru, and Mahdi Nasrullah Al-Ameen. 2023. "It doesn’t just feel like something a lawyer slapped together. " Mental-Model-Based Privacy Policy for Third-Party Applications on Facebook. InCompanion Publication of the 2023 Conference on Computer Supported Cooperative Work and Social Computing (Minneapolis, MN, USA)(CSC...
-
[37]
Maxwell Prybylo, Sara Haghighi, Sai Teja Peddinti, and Sepideh Ghanavati. 2024. Evaluating Privacy Perceptions, Expe- rience, and Behavior of Software Development Teams. InTwentieth Symposium on Usable Privacy and Security (SOUPS 2024). USENIX Association, Philadelphia, PA, 101–120. https://www.usenix.org/conference/soups2024/presentation/ prybylo
2024
-
[38]
Martin P. Robillard, Deeksha M. Arya, Neil A. Ernst, Jin L. C. Guo, Maxime Lamothe, Mathieu Nassif, Nicole Novielli, Alexander Serebrenik, Igor Steinmacher, and Klaas-Jan Stol. 2024. Communicating Study Design Trade-offs in Software Engineering.ACM Trans. Softw. Eng. Methodol.33, 5, Article 112 (June 2024), 10 pages. doi:10.1145/3649598 , Vol. 1, No. 1, A...
-
[39]
Lorena Sánchez Chamorro, Kerstin Bongard-Blanchy, and Vincent Koenig. 2023. Ethical Tensions in UX Design Practice: Exploring the Fine Line Between Persuasion and Manipulation in Online Interfaces. InProceedings of the 2023 ACM Designing Interactive Systems Conference(Pittsburgh, PA, USA)(DIS ’23). Association for Computing Machinery, New York, NY, USA, 2...
-
[40]
Lingareddy, and Marshini Chetty
Brennan Schaffner, Neha A. Lingareddy, and Marshini Chetty. 2022. Understanding Account Deletion and Relevant Dark Patterns on Social Media.Proc. ACM Hum.-Comput. Interact.6, CSCW2, Article 417 (Nov. 2022), 43 pages. doi:10.1145/3555142
-
[41]
Varun Shiri, Maggie Xiong, Jinghui Cheng, and Jin L.C. Guo. 2024. Motivating Users to Attend to Privacy: A Theory- Driven Design Study. InProceedings of the 2024 ACM Designing Interactive Systems Conference(Copenhagen, Denmark) (DIS ’24). Association for Computing Machinery, New York, NY, USA, 258–275. doi:10.1145/3643834.3661544
-
[42]
Nivedita Singh, Yejin Do, Yongsang Yu, Imane Fouad, Jungrae Kim, and Hyoungshick Kim. 2025. Crumbled Cookies: Exploring E-commerce Websites’ Cookie Policies with Data Protection Regulations.ACM Trans. Web19, 1, Article 5 (Jan. 2025), 24 pages. doi:10.1145/3708515
-
[43]
Sean Sirur, Jason R.C. Nurse, and Helena Webb. 2018. Are We There Yet? Understanding the Challenges Faced in Complying with the General Data Protection Regulation (GDPR). InProceedings of the 2nd International Workshop on Multimedia Privacy and Security(Toronto, Canada)(MPS ’18). Association for Computing Machinery, New York, NY, USA, 88–95. doi:10.1145/3...
-
[44]
Daniel J. Solove. 2020. The Myth of the Privacy Paradox.SSRN Electronic Journal(2020). doi:10.2139/ssrn.3536265
-
[45]
Secure Software Development Framework (SSDF) Version 1.1,
Murugiah Souppaya, Karen Scarfone, and Donna Dodson. 2022.Secure Software Development Framework (SSDF) Version 1.1: Recommendations for Mitigating the Risk of Software Vulnerabilities. Technical Report SP 800-218. National Institute of Standards and Technology (NIST). https://doi.org/10.6028/NIST.SP.800-218 Supersedes: CSWP 13 (04/23/2020)
- [46]
-
[47]
Karen M Staller. 2021. Big enough? Sampling in qualitative inquiry.Qualitative Social Work20, 4 (2021), 897–904. doi:10.1177/14733250211024516
-
[48]
Mohammad Tahaei, Alisa Frik, and Kami Vaniea. 2021. Privacy Champions in Software Teams: Understanding Their Motivations, Strategies, and Challenges. InProceedings of the 2021 CHI Conference on Human Factors in Computing Systems(Yokohama, Japan)(CHI ’21). Association for Computing Machinery, New York, NY, USA, Article 693, 15 pages. doi:10.1145/3411764.3445768
-
[49]
2021.Industry unbound: The inside story of privacy, data, and corporate power
Ari Ezra Waldman. 2021.Industry unbound: The inside story of privacy, data, and corporate power. Cambridge University Press
2021
-
[50]
Richmond Y. Wong, Andrew Chong, and R. Cooper Aspegren. 2023. Privacy Legislation as Business Risks: How GDPR and CCPA are Represented in Technology Companies’ Investment Risk Disclosures.Proc. ACM Hum.-Comput. Interact. 7, CSCW1, Article 82 (April 2023), 26 pages. doi:10.1145/3579515
-
[51]
Bo Zhang and Heng Xu. 2016. Privacy Nudges for Mobile Applications: Effects on the Creepiness Emotion and Privacy Attitudes. InProceedings of the 19th ACM Conference on Computer-Supported Cooperative Work & Social Computing (San Francisco, California, USA)(CSCW ’16). Association for Computing Machinery, New York, NY, USA, 1676–1690. doi:10.1145/2818048.2820073
-
[52]
Leah Zhang-Kennedy, Maxwell Keleher, and Michaela Valiquette. 2024. Navigating the Gray: Design Practitioners’ Perceptions Toward the Implementation of Privacy Dark Patterns.Proc. ACM Hum.-Comput. Interact.8, CSCW1, Article 97 (April 2024), 26 pages. doi:10.1145/3637374
-
[53]
Shoshana Zuboff. 2023. The age of surveillance capitalism. InSocial theory re-wired. Routledge, 203–213. , Vol. 1, No. 1, Article . Publication date: April 2026
2023
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.