Privately Policing Dark Patterns
- URL: http://arxiv.org/abs/2307.07888v1
- Date: Sat, 15 Jul 2023 21:59:05 GMT
- Title: Privately Policing Dark Patterns
- Authors: Gregory M. Dickinson
- Abstract summary: Lawmakers around the country are crafting new laws to target "dark patterns"
This Article proposes leveraging state private law to define and track dark patterns as they evolve.
- Score: 0.0
- License: http://creativecommons.org/licenses/by-nc-sa/4.0/
- Abstract: Lawmakers around the country are crafting new laws to target "dark patterns"
-- user interface designs that trick or coerce users into enabling cell phone
location tracking, sharing browsing data, initiating automatic billing, or
making whatever other choices their designers prefer. Dark patterns pose a
serious problem. In their most aggressive forms, they interfere with human
autonomy, undermine customers' evaluation and selection of products, and
distort online markets for goods and services. Yet crafting legislation is a
major challenge: Persuasion and deception are difficult to distinguish, and
shifting tech trends present an ever-moving target. To address these
challenges, this Article proposes leveraging state private law to define and
track dark patterns as they evolve. Judge-crafted decisional law can respond
quickly to new techniques, flexibly define the boundary between permissible and
impermissible designs, and bolster state and federal regulatory enforcement
efforts by quickly identifying those designs that most undermine user autonomy.
Related papers
- A Novel Access Control and Privacy-Enhancing Approach for Models in Edge Computing [0.26107298043931193]
We propose a novel model access control method tailored for edge computing environments.
This method leverages image style as a licensing mechanism, embedding style recognition into the model's operational framework.
By restricting the input data to the edge model, this approach not only prevents attackers from gaining unauthorized access to the model but also enhances the privacy of data on terminal devices.
arXiv Detail & Related papers (2024-11-06T11:37:30Z) - Mapping the Scholarship of Dark Pattern Regulation: A Systematic Review of Concepts, Regulatory Paradigms, and Solutions from an Interdisciplinary Perspective [7.529549026367749]
This study synthesises the unique trends and characteristics of legal scholarship on dark patterns, identifying five root problems and triple layered harms.
It critiques current regulations in terms of legal theories and sectoral legislations, highlighting their connotation in addressing dark patterns.
This research critically discusses the current barriers to effective dark pattern regulations and explores promising regulatory solutions.
arXiv Detail & Related papers (2024-07-14T21:41:18Z) - Demarked: A Strategy for Enhanced Abusive Speech Moderation through Counterspeech, Detoxification, and Message Management [71.99446449877038]
We propose a more comprehensive approach called Demarcation scoring abusive speech based on four aspect -- (i) severity scale; (ii) presence of a target; (iii) context scale; (iv) legal scale.
Our work aims to inform future strategies for effectively addressing abusive speech online.
arXiv Detail & Related papers (2024-06-27T21:45:33Z) - Intention and Context Elicitation with Large Language Models in the
Legal Aid Intake Process [0.7252027234425334]
We demonstrate a proof-of-concept using Large Language Models (LLMs) to elicit and infer clients' underlying intentions and specific legal circumstances.
We also propose future research directions to use supervised fine-tuning or offline reinforcement learning to automatically incorporate intention and context elicitation.
arXiv Detail & Related papers (2023-11-22T10:04:29Z) - A Juridicidade e a Regulamenta\c{c}\~ao dos Dark Patterns [0.0]
The work aims to address whether Dark Patterns are legal or illegal in the face of Brazilian data protection and consumer law.
Although some implementations are capable of producing damage and violating rights in some cases the mere declaration of the illegality of these techniques is an insufficient solution.
arXiv Detail & Related papers (2023-02-17T12:13:13Z) - Fact-Saboteurs: A Taxonomy of Evidence Manipulation Attacks against
Fact-Verification Systems [80.3811072650087]
We show that it is possible to subtly modify claim-salient snippets in the evidence and generate diverse and claim-aligned evidence.
The attacks are also robust against post-hoc modifications of the claim.
These attacks can have harmful implications on the inspectable and human-in-the-loop usage scenarios.
arXiv Detail & Related papers (2022-09-07T13:39:24Z) - How to Steer Your Adversary: Targeted and Efficient Model Stealing
Defenses with Gradient Redirection [16.88718696087103]
We present a new approach to model stealing defenses called gradient redirection.
At the core of our approach is a provably optimal, efficient algorithm for steering an adversary's training updates in a targeted manner.
Combined with improvements to surrogate networks and a novel coordinated defense strategy, our gradient redirection defense, called GRAD$2$, achieves small utility trade-offs and low computational overhead.
arXiv Detail & Related papers (2022-06-28T17:04:49Z) - Restricted Black-box Adversarial Attack Against DeepFake Face Swapping [70.82017781235535]
We introduce a practical adversarial attack that does not require any queries to the facial image forgery model.
Our method is built on a substitute model persuing for face reconstruction and then transfers adversarial examples from the substitute model directly to inaccessible black-box DeepFake models.
arXiv Detail & Related papers (2022-04-26T14:36:06Z) - Initiative Defense against Facial Manipulation [82.96864888025797]
We propose a novel framework of initiative defense to degrade the performance of facial manipulation models controlled by malicious users.
We first imitate the target manipulation model with a surrogate model, and then devise a poison perturbation generator to obtain the desired venom.
arXiv Detail & Related papers (2021-12-19T09:42:28Z) - Practical Relative Order Attack in Deep Ranking [99.332629807873]
We formulate a new adversarial attack against deep ranking systems, i.e., the Order Attack.
The Order Attack covertly alters the relative order among a selected set of candidates according to an attacker-specified permutation.
It is successfully implemented on a major e-commerce platform.
arXiv Detail & Related papers (2021-03-09T06:41:18Z) - A vision for global privacy bridges: Technical and legal measures for
international data markets [77.34726150561087]
Despite data protection laws and an acknowledged right to privacy, trading personal information has become a business equated with "trading oil"
An open conflict is arising between business demands for data and a desire for privacy.
We propose and test a vision of a personal information market with privacy.
arXiv Detail & Related papers (2020-05-13T13:55:50Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.