Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3313831.3376321acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

Dark Patterns after the GDPR: Scraping Consent Pop-ups and Demonstrating their Influence

Published: 23 April 2020 Publication History

Abstract

New consent management platforms (CMPs) have been introduced to the web to conform with the EU's General Data Protection Regulation, particularly its requirements for consent when companies collect and process users' personal data. This work analyses how the most prevalent CMP designs affect people's consent choices. We scraped the designs of the five most popular CMPs on the top 10,000 websites in the UK (n=680). We found that dark patterns and implied consent are ubiquitous; only 11.8% meet our minimal requirements based on European law. Second, we conducted a field experiment with 40 participants to investigate how the eight most common designs affect consent choices. We found that notification style (banner or barrier) has no effect; removing the opt-out button from the first page increases consent by 22-23 percentage points; and providing more granular controls on the first page decreases consent by 8-20 percentage points. This study provides an empirical basis for the necessary regulatory action to enforce the GDPR, in particular the possibility of focusing on the centralised, third-party CMP services as an effective way to increase compliance.

References

[1]
Alessandro Acquisti and Jens Grossklags. 2005. Privacy and rationality in individual decision making. Security Privacy, IEEE 3, 1 (2005), 26--33.
[2]
Advocate General Szupunar. 2019. Case C-673/17 Planet49 GmbH v Bundesverband der Verbraucherzentralen und Verbraucherverbände -- Verbraucherzentrale Bundesverband e.V. ECLI:EU:C:2019:246, Opinion of the Advocate General. (2019).
[3]
Adzerk. 2019. Adtech Insights - August 2019 Report. (2019). https://adzerk.com/assets/reports/AdTechInsights_Aug2019.pdf
[4]
Julio Angulo, Simone Fischer-Hübner, Tobias Pulls, and Erik Wästlund. 2011. Towards Usable Privacy Policy Display & Management for PrimeLife. S. M. Furnell, & N. L. Clarke (Eds.), Proceedings of international symposium on human aspects of information security & assurance (HAISA 2011) (2011), 108 -- 117.
[5]
Article 29 Working Party. 2018. Guidelines on Consent under Regulation 2016/679 (WP259 rev.01). European Union.
[6]
Autoriteit Persoonsgegevens. 2019. Hoe Legt de AP de Juridische Normen Rond Cookiewalls Uit? AP, Den Haag.
[7]
Meinert David B., Dane K. Peterson, John R. Criswell, and Martin D. Crossland. 2006. Towards Usable Privacy Policy Display & Management for PrimeLife. Journal of Electronic Commerce in Organizations (JECO) 4, 1 (2006), 1--17.
[8]
Christoph Bösch, Benjamin Erb, Frank Kargl, Henning Kopp, and Stefan Pfattheicher. 2016. Tales from the dark side: Privacy dark strategies and privacy dark patterns. Proceedings on Privacy Enhancing Technologies 2016, 4 (2016), 237--254.
[9]
Axel Bruns. 2019. After the 'APIcalypse': Social Media Platforms and Their Fight against Critical Scholarly Research. Information, Communication & Society 22, 11 (2019), 1544--1566.
[10]
Tania Bucher. 2013. Objects of Intense Feeling: The Case of the Twitter API : Computational Culture. Computational Culture: A Journal of Software Studies 3 (2013). http://computationalculture.net/objects-of-intensefeeling-the-case-of-the-twitter-api/
[11]
Fred H Cate. 2010. The limits of notice and choice. IEEE Security & Privacy 8, 2 (2010), 59--62.
[12]
Damian Clifford, Inge Graef, and Peggy Valcke. 2019. Pre-formulated Declarations of Data Subject Consent-Citizen-Consumer Empowerment and the Alignment of Data, Consumer and Competition Law Protections. German Law Journal 20, 5 (2019), 679--721.
[13]
Commission nationale de l'informatique et des libertés (CNIL). 2019. Délibération n° 2019-093 du 4 juillet 2019 portant adoption de lignes directrices relatives à l'application de l'article 82 de la loi du 6 janvier 1978 modifiée aux opérations de lecture ou écriture dans le terminal d'un utilisateur (notamment aux cookies et autres traceurs) (rectificatif). (2019).
[14]
Gregory Conti and Edward Sobiesk. 2010. Malicious Interface Design: Exploiting the User. In Proceedings of the 19th International Conference on World Wide Web. ACM, 271--280.
[15]
Jake R. Conway, Alexander Lex, and Nils Gehlenborg. 2017. UpSetR: An R Package for the Visualization of Intersecting Sets and Their Properties. Bioinformatics 33, 18 (2017), 2938--2940.
[16]
Court of Justice of the European Union. 2019a. Case C-49/17 Fashion ID GmbH & Co.KG v Verbraucherzentrale NRW eV. ECLI:EU:C:2019:629. (2019).
[17]
Court of Justice of the European Union. 2019b. Case C-673/17 Planet49 GmbH v Bundesverband der Verbraucherzentralen und Verbraucherverbände -- Verbraucherzentrale Bundesverband e.V. ECLI:EU:C:2019:801. (2019).
[18]
Lorrie Cranor. 2002. Web privacy with P3P. O'Reilly Media, Sebastopol, CA.
[19]
Lorrie Faith Cranor. 2012. Necessary but Not Sufficient: Standardized Mechanisms for Privacy Notice and Choice The Economics of Privacy. Journal on Telecommunications and High Technology Law 10, 2 (2012), 273--308.
[20]
Mark R. Warner Deb Fisher. 2019. Deceptive Experiences To Online Users Reduction (DETOUR) Act. https://www.scribd.com/document/405606873/Detour-Act-Final
[21]
Martin Degeling, Christine Utz, Christopher Lentzsch, Henry Hosseini, Florian Schaub, and Thorsten Holz. 2018. We Value Your Privacy... Now Take Some Cookies: Measuring the GDPR's Impact on Web Privacy. arXiv preprint arXiv:1808.05096 (2018).
[22]
European Data Protection Supervisor. EDPS Opinion on the Proposal for a Regulation on Privacy and Electronic Communications (ePrivacy Regulation), Opinion 6/2017. EDPS, Brussels, BE.
[23]
European Union. 1995. Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, OJ 1995 L 281/31. (1995).
[24]
European Union. 2002. Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications) OJ L 201. (2002).
[25]
European Union. 2016. Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation), OJ 2016 L 119/1. (2016).
[26]
Brian J Fogg. 2009. A behavior model for persuasive design. In Proceedings of the 4th international Conference on Persuasive Technology. ACM, 40.
[27]
Forbrukerrådet. 2019. Deceived by Design: How tech companies use dark patterns to discourage us from exercising our rights to privacy. (2019). https://fil.forbrukerradet.no/wp-content/uploads/2018/06/2018-06--27-deceived-by-design-final.pdf
[28]
Colin M Gray, Yubo Kou, Bryan Battles, Joseph Hoggatt, and Austin L Toombs. 2018. The dark (patterns) side of UX design. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. ACM, 534.
[29]
Information Commissioner's Office. 2019a. Guidance on the Use of Cookies and Similar Technologies. ICO, Wilmslow, Cheshire.
[30]
Information Commissioner's Office. 2019b. Update Report into Adtech and Real Time Bidding. ICO, Wilmslow, Cheshire.
[31]
Carlos Jensen and Colin Potts. 2004. Privacy policies as decision-making tools: an evaluation of online privacy notices. In Proceedings of the SIGCHI conference on Human Factors in Computing Systems. ACM, 471--478.
[32]
Irene Kamara and Eleni Kosta. 2016. Do Not Track Initiatives: Regaining the Lost User Control. International Data Privacy Law 6, 4 (2016), 276--290.
[33]
Patrick Gage Kelley, Joanna Bresee, Lorrie Faith Cranor, and Robert W Reeder. 2009. A nutrition label for privacy. In Proceedings of the 5th Symposium on Usable Privacy and Security. ACM, 4.
[34]
Eleni Kosta. 2013. Peeking into the Cookie Jar: The European Approach towards the Regulation of Cookies. International Journal of Law and Information Technology 21, 4 (2013), 380--406.
[35]
A. Lex, N. Gehlenborg, H. Strobelt, R. Vuillemot, and H. Pfister. 2014. UpSet: Visualization of Intersecting Sets. IEEE Transactions on Visualization and Computer Graphics 20, 12 (2014), 1983--1992.
[36]
Rene Mahieu, Joris van Hoboken, and Hadi Asghari. 2019. Responsibility for Data Protection in a Networked World: On the Question of the Controller, Effective and Complete Protection and Its Application to Data Access Rights in Europe. Journal of Intellectual Property, Information Technology and Electronic Commerce Law 10, 1 (2019), 84--104.
[37]
Arunesh Mathur, Gunes Acar, Michael J Friedman, Elena Lucherini, Jonathan Mayer, Marshini Chetty, and Arvind Narayanan. 2019. Dark patterns at scale: Findings from a crawl of 11K shopping websites. Proceedings of the ACM on Human-Computer Interaction 3, CSCW (2019), 81.
[38]
Célestin Matte, Nataliia Bielova, and Cristiana Santos. 2019. Do Cookie Banners Respect my Choice? Measuring Legal Compliance of Banners from IAB Europe's Transparency and Consent Framework (Under submission). https://arxiv.org/abs/1911.09964v1
[39]
John McCarthy. 2019. Over 90% of users consent to GDPR requests says Quantcast after enabling 1bn of them. https://www.thedrum.com/news/2018/07/31/over-90-users-consentgdpr-requests-says-quantcast-after-enabling-1bn-them. (2019).
[40]
A. M. McDonald and L. F. Cranor. 2008. The cost of reading privacy policies. I/S: A Journal of Law and Policy for the Information Society 4 (2008), 540 -- 565.
[41]
H. Nissenbaum. 2011. A contextual approach to privacy online. Daedalus 140, 4 (2011), 32--48.
[42]
Jonathan A. Obar and Anne Oeldorf-Hirsch. 2018. The biggest lie on the Internet: ignoring the privacy policies and terms of service policies of social networking services. Information, Communication & Society 0, 0 (2018), 1--20.
[43]
Robert W Reeder, Lujo Bauer, Lorrie Faith Cranor, Michael K Reiter, Kelli Bacon, Keisha How, and Heather Strong. 2008. Expandable grids for visualizing and authoring computer security policies. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 1473--1482.
[44]
Iskander Sanchez-Rola, Matteo Dell'Amico, Platon Kotzias, Davide Balzarotti, Leyla Bilge, Pierre-Antoine Vervier, and Igor Santos. 2019. Can I Opt Out Yet?: GDPR and the Global Illusion of Cookie Control. In Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security (Asia CCS '19). ACM, NY, NY, USA, 340--351.
[45]
Florian Schaub, Rebecca Balebako, Adam L Durity, and Lorrie Faith Cranor. 2015. A design space for effective privacy notices. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015). 1--17.
[46]
Natasha Singer. 2016. When Websites Won't Take No for an Answer. New York Times (15 5 2016). Retrieved Sept 19, 2019 from https://www.nytimes.com/2016/05/15/technology/personaltech/when-websites-wont-take-no-foran-answer.html?mcubz=0&_r=0
[47]
Jannick Sørensen and Sokol Kosta. 2019. Before and After GDPR: The Changes in Third Party Presence at Public and Private European Websites. In The World Wide Web Conference (WWW '19). ACM, NY, NY, USA, 1590--1600.
[48]
European Data Protection Supervisor. 2018. EDPS Opinion on the legislative package "A New Deal for Consumers". https://edps.europa.eu/sites/edp/files/publication/1810-05_opinion_consumer_law_en.pdf
[49]
Richard H Thaler and Cass R Sunstein. 2009. Nudge: Improving decisions about health, wealth, and happiness. Penguin.
[50]
Oisin Tobin. 2019. Cookie consent revisited. Privacy and Data Protection 19 (2019), 11. Issue 5.
[51]
Martino Trevisan, Stefano Traverso, Eleonora Bassi, and Marco Mellia. 2019. 4 Years of EU Cookie Law: Results and Lessons Learned. Proceedings on Privacy Enhancing Technologies 2019, 2 (2019), 126--145.
[52]
Christine Utz, Martin Degeling, Sascha Fahl, Florian Schaub, and Thorsten Holz. 2019. (Un)Informed Consent: Studying GDPR Consent Notices in the Field. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (CCS '19). ACM, NY, NY, USA, 973--990.
[53]
Brendan Van Alsenoy. 2019. Data Protection Law in the EU: Roles, Responsibilities and Liability. Intersentia, Cambridge.
[54]
Tony Vila, Rachel Greenstadt, and David Molnar. 2003. Why We Can'T Be Bothered to Read Privacy Policies Models of Privacy Economics As a Lemons Market. In Proceedings of the 5th International Conference on Electronic Commerce (ICEC '03). 403--407.
[55]
Frederik J Zuiderveen Borgesius, Sanne Kruikemeier, Sophie C Boerman, and Natali Helberger. 2017. Tracking Walls, Take-It-Or-Leave-It Choices, the GDPR, and the ePrivacy Regulation. European Data Protection Law Review 3, 3 (2017), 353--368.

Cited By

View all
  • (2025)Challenges and Opportunities of Digital Dentistry in Remote EnvironmentsTransforming Dental Health in Rural Communities10.4018/979-8-3693-7165-7.ch009(233-270)Online publication date: 10-Jan-2025
  • (2025)Investigating consumer challenges against dark patterns using grey influence analysis (GINA)Marketing Intelligence & Planning10.1108/MIP-08-2024-0538Online publication date: 16-Jan-2025
  • (2025)Dark patterns, dimmed brands: the erosion of equity through deceptive design in e-commerceInternet Research10.1108/INTR-07-2024-1026Online publication date: 24-Jan-2025
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems
April 2020
10688 pages
ISBN:9781450367080
DOI:10.1145/3313831
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 23 April 2020

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. consent management platforms
  2. controlled experiment
  3. dark patterns
  4. gdpr
  5. notice and consent
  6. web scraper

Qualifiers

  • Research-article

Funding Sources

Conference

CHI '20
Sponsor:

Acceptance Rates

Overall Acceptance Rate 6,199 of 26,314 submissions, 24%

Upcoming Conference

CHI 2025
ACM CHI Conference on Human Factors in Computing Systems
April 26 - May 1, 2025
Yokohama , Japan

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1,083
  • Downloads (Last 6 weeks)92
Reflects downloads up to 08 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2025)Challenges and Opportunities of Digital Dentistry in Remote EnvironmentsTransforming Dental Health in Rural Communities10.4018/979-8-3693-7165-7.ch009(233-270)Online publication date: 10-Jan-2025
  • (2025)Investigating consumer challenges against dark patterns using grey influence analysis (GINA)Marketing Intelligence & Planning10.1108/MIP-08-2024-0538Online publication date: 16-Jan-2025
  • (2025)Dark patterns, dimmed brands: the erosion of equity through deceptive design in e-commerceInternet Research10.1108/INTR-07-2024-1026Online publication date: 24-Jan-2025
  • (2025)Divergent deceptions: comparative analysis of Deceptive Patterns in iOS and Android appsBehaviour & Information Technology10.1080/0144929X.2025.2452359(1-30)Online publication date: 16-Jan-2025
  • (2025)Dark patterns and consumer vulnerabilityBehavioural Public Policy10.1017/bpp.2024.49(1-50)Online publication date: 3-Feb-2025
  • (2025)Damage Caused by Emotional AI: Do Existing and Prospective Liability Rules Provide Sufficient Protection?Emotional Data Applications and Regulation of Artificial Intelligence in Society10.1007/978-3-031-80111-2_14(239-259)Online publication date: 23-Jan-2025
  • (2024)How WEIRD is usable privacy and security research?Proceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3699082(3241-3258)Online publication date: 14-Aug-2024
  • (2024)The effect of design patterns on (present and future) cookie consent decisionsProceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3699058(2813-2830)Online publication date: 14-Aug-2024
  • (2024)"I'm not convinced that they don't collect more than is necessary"Proceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3699057(2797-2812)Online publication date: 14-Aug-2024
  • (2024)Automated large-scale analysis of cookie notice complianceProceedings of the 33rd USENIX Conference on Security Symposium10.5555/3698900.3698997(1723-1739)Online publication date: 14-Aug-2024
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media