Privately Policing Dark Patterns
- URL: http://arxiv.org/abs/2307.07888v1
- Date: Sat, 15 Jul 2023 21:59:05 GMT
- Title: Privately Policing Dark Patterns
- Authors: Gregory M. Dickinson
- Abstract summary: Lawmakers around the country are crafting new laws to target "dark patterns"
This Article proposes leveraging state private law to define and track dark patterns as they evolve.
- Score: 0.0
- License: http://creativecommons.org/licenses/by-nc-sa/4.0/
- Abstract: Lawmakers around the country are crafting new laws to target "dark patterns"
-- user interface designs that trick or coerce users into enabling cell phone
location tracking, sharing browsing data, initiating automatic billing, or
making whatever other choices their designers prefer. Dark patterns pose a
serious problem. In their most aggressive forms, they interfere with human
autonomy, undermine customers' evaluation and selection of products, and
distort online markets for goods and services. Yet crafting legislation is a
major challenge: Persuasion and deception are difficult to distinguish, and
shifting tech trends present an ever-moving target. To address these
challenges, this Article proposes leveraging state private law to define and
track dark patterns as they evolve. Judge-crafted decisional law can respond
quickly to new techniques, flexibly define the boundary between permissible and
impermissible designs, and bolster state and federal regulatory enforcement
efforts by quickly identifying those designs that most undermine user autonomy.
Related papers
- Turning Logic Against Itself : Probing Model Defenses Through Contrastive Questions [51.51850981481236]
We introduce POATE, a novel jailbreak technique that harnesses contrastive reasoning to provoke unethical responses.
PoATE crafts semantically opposing intents and integrates them with adversarial templates, steering models toward harmful outputs with remarkable subtlety.
To counter this, we propose Intent-Aware CoT and Reverse Thinking CoT, which decompose queries to detect malicious intent and reason in reverse to evaluate and reject harmful responses.
arXiv Detail & Related papers (2025-01-03T15:40:03Z) - The Patterns of Digital Deception [0.0]
New data-analysis techniques have disrupted the balance of power between companies and their customers.
Online tracking enables sellers to amass troves of historical data, apply machine-learning tools to construct detailed customer profiles.
The same tools are also used for ill -- to target vulnerable members of the population with scams specially tailored to prey on their weaknesses.
arXiv Detail & Related papers (2024-12-25T15:55:17Z) - Mapping the Scholarship of Dark Pattern Regulation: A Systematic Review of Concepts, Regulatory Paradigms, and Solutions from an Interdisciplinary Perspective [7.529549026367749]
This study synthesises the unique trends and characteristics of legal scholarship on dark patterns, identifying five root problems and triple layered harms.
It critiques current regulations in terms of legal theories and sectoral legislations, highlighting their connotation in addressing dark patterns.
This research critically discusses the current barriers to effective dark pattern regulations and explores promising regulatory solutions.
arXiv Detail & Related papers (2024-07-14T21:41:18Z) - Demarked: A Strategy for Enhanced Abusive Speech Moderation through Counterspeech, Detoxification, and Message Management [71.99446449877038]
We propose a more comprehensive approach called Demarcation scoring abusive speech based on four aspect -- (i) severity scale; (ii) presence of a target; (iii) context scale; (iv) legal scale.
Our work aims to inform future strategies for effectively addressing abusive speech online.
arXiv Detail & Related papers (2024-06-27T21:45:33Z) - Intention and Context Elicitation with Large Language Models in the
Legal Aid Intake Process [0.7252027234425334]
We demonstrate a proof-of-concept using Large Language Models (LLMs) to elicit and infer clients' underlying intentions and specific legal circumstances.
We also propose future research directions to use supervised fine-tuning or offline reinforcement learning to automatically incorporate intention and context elicitation.
arXiv Detail & Related papers (2023-11-22T10:04:29Z) - A Juridicidade e a Regulamenta\c{c}\~ao dos Dark Patterns [0.0]
The work aims to address whether Dark Patterns are legal or illegal in the face of Brazilian data protection and consumer law.
Although some implementations are capable of producing damage and violating rights in some cases the mere declaration of the illegality of these techniques is an insufficient solution.
arXiv Detail & Related papers (2023-02-17T12:13:13Z) - How to Steer Your Adversary: Targeted and Efficient Model Stealing
Defenses with Gradient Redirection [16.88718696087103]
We present a new approach to model stealing defenses called gradient redirection.
At the core of our approach is a provably optimal, efficient algorithm for steering an adversary's training updates in a targeted manner.
Combined with improvements to surrogate networks and a novel coordinated defense strategy, our gradient redirection defense, called GRAD$2$, achieves small utility trade-offs and low computational overhead.
arXiv Detail & Related papers (2022-06-28T17:04:49Z) - Restricted Black-box Adversarial Attack Against DeepFake Face Swapping [70.82017781235535]
We introduce a practical adversarial attack that does not require any queries to the facial image forgery model.
Our method is built on a substitute model persuing for face reconstruction and then transfers adversarial examples from the substitute model directly to inaccessible black-box DeepFake models.
arXiv Detail & Related papers (2022-04-26T14:36:06Z) - Initiative Defense against Facial Manipulation [82.96864888025797]
We propose a novel framework of initiative defense to degrade the performance of facial manipulation models controlled by malicious users.
We first imitate the target manipulation model with a surrogate model, and then devise a poison perturbation generator to obtain the desired venom.
arXiv Detail & Related papers (2021-12-19T09:42:28Z) - Practical Relative Order Attack in Deep Ranking [99.332629807873]
We formulate a new adversarial attack against deep ranking systems, i.e., the Order Attack.
The Order Attack covertly alters the relative order among a selected set of candidates according to an attacker-specified permutation.
It is successfully implemented on a major e-commerce platform.
arXiv Detail & Related papers (2021-03-09T06:41:18Z) - A vision for global privacy bridges: Technical and legal measures for
international data markets [77.34726150561087]
Despite data protection laws and an acknowledged right to privacy, trading personal information has become a business equated with "trading oil"
An open conflict is arising between business demands for data and a desire for privacy.
We propose and test a vision of a personal information market with privacy.
arXiv Detail & Related papers (2020-05-13T13:55:50Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.