Feb. 7, 2024, 5:10 a.m. | Zewei Shi Ruoxi Sun Jieshan Chen Jiamou Sun Minhui Xue

cs.CR updates on arXiv.org arxiv.org

Deceptive patterns are design practices embedded in digital platforms to manipulate users, representing a widespread and long-standing issue in the web and mobile software development industry. Legislative actions highlight the urgency of globally regulating deceptive patterns. However, despite advancements in detection tools, a significant gap exists in assessing deceptive pattern risks. In this study, we introduce a comprehensive approach involving the interactions between the Adversary, Watchdog (e.g., detection tools), and Challengers (e.g., users) to formalize and decode deceptive pattern threats. …

actions case cs.cr decoding design detection development digital embedded game gap industry internet issue mobile mobile software patterns platforms practices software software development study the web tools web

Information Technology Specialist II: Information Security Engineer

@ WBCP, Inc. | Pasadena, CA.

Director of the Air Force Cyber Technical Center of Excellence (CyTCoE)

@ Air Force Institute of Technology | Dayton, OH, USA

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Senior Cybersecurity Analyst - Digital Cybersecurity Analytics

@ Target | 7000 Target Pkwy N,NCD-0375 Brooklyn Park,MN 55445

Security Consulting Automation Developer (Unit 42)

@ Palo Alto Networks | Reston, VA, United States

Technical Consultant - Microsoft

@ AppDirect | Chicago, United States