Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3613904.3642104acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

Privacy in Immersive Extended Reality: Exploring User Perceptions, Concerns, and Coping Strategies

Published: 11 May 2024 Publication History

Abstract

Extended Reality (XR) technology is changing online interactions, but its granular data collection sensors may be more invasive to user privacy than web, mobile, and the Internet of Things technologies. Despite an increased interest in studying developers’ concerns about XR device privacy, user perceptions have rarely been addressed. We surveyed 464 XR users to assess their awareness, concerns, and coping strategies around XR data in 18 scenarios. Our findings demonstrate that many factors, such as data types and sensitivity, affect users’ perceptions of privacy in XR. However, users’ limited awareness of XR sensors’ granular data collection capabilities, such as involuntary body signals of emotional responses, restricted the range of privacy-protective strategies they used. Our results highlight a need to enhance users’ awareness of data privacy threats in XR, design privacy-choice interfaces tailored to XR environments, and develop transparent XR data practices.

Supplemental Material

MP4 File - Video Presentation
Video Presentation
Transcript for: Video Presentation

References

[1]
Melvin Abraham, Pejman Saeghe, Mark Mcgill, and Mohamed Khamis. 2022. Implications of XR on Privacy, Security and Behaviour: Insights from Experts. In Nordic Human-Computer Interaction Conference (Aarhus, Denmark) (NordiCHI ’22). Association for Computing Machinery, New York, NY, USA, Article 30, 12 pages. https://doi.org/10.1145/3546155.3546691
[2]
Devon Adams, Alseny Bah, Catherine Barwulor, Nureli Musabay, Kadeem Pitkin, and Elissa M. Redmiles. 2018. Ethics Emerging: The Story of Privacy and Security Perceptions in Virtual Reality. In Proceedings of the Fourteenth USENIX Conference on Usable Privacy and Security (Baltimore, MD, USA) (SOUPS ’18). USENIX Association, USA, 443–458.
[3]
Thomas Alsop. 2022. XR: AR, VR, and the metaverse - statistics & facts. Last accessed on November 27, 2022.
[4]
Debjanee Barua, Judy Kay, and Cécile Paris. 2013. Viewing and Controlling Personal Sensor Data: What Do Users Want?. In Persuasive Technology, Shlomo Berkovsky and Jill Freyne (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 15–26.
[5]
Florian Bemmann, Maximiliane Windl, Jonas Erbe, Sven Mayer, and Heinrich Hussmann. 2022. The influence of transparency and control on the willingness of data sharing in adaptive mobile apps. Proceedings of the ACM on Human-Computer Interaction 6, MHCI (2022), 1–26.
[6]
Virginia Braun and Victoria Clarke. 2012. Thematic analysis. In APA handbook of research methods in psychology, Vol 2: Research designs: Quantitative, qualitative, neuropsychological, and biological.American Psychological Association, Washington, DC, US, 57–71. https://doi.org/10.1037/13620-004
[7]
Lauren Buck and Rachel McDonnell. 2022. Security and Privacy in the Metaverse: The Threat of the Digital Human. In Proceedings of CHI Conference on Human Factors in Computing Systems (CHI EA ’22, Proceedings of the 1st Workshop on Novel Challenges of Safety, Security and Privacy in Extended Reality. ACM, New York, USA, 4 pages.
[8]
Shi-Yi Chen, Zhe Feng, and Xiaolian Yi. 2017. A general introduction to adjustment for multiple comparisons. Journal of thoracic disease 9, 6 (2017), 1725.
[9]
Rune Haubo B Christensen. 2019. A Tutorial on fitting Cumulative Link Mixed Models with clmm2 from the ordinal Package. Tutorial for the R Package ordinal 1 (2019), 10 pages.
[10]
Jessica Colnago, Yuanyuan Feng, Tharangini Palanivel, Sarah Pearman, Megan Ung, Alessandro Acquisti, Lorrie Faith Cranor, and Norman Sadeh. 2020. Informing the Design of a Personalized Privacy Assistant for the Internet of Things. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (Honolulu, HI, USA) (CHI ’20). Association for Computing Machinery, New York, NY, USA, 1–13. https://doi.org/10.1145/3313831.3376389
[11]
James J Cummings and Jeremy N Bailenson. 2016. How immersive is enough? A meta-analysis of the effect of immersive technology on user presence. Media psychology 19, 2 (2016), 272–309.
[12]
Jaybie Agullo de Guzman, Kanchana Thilakarathna, and Aruna Seneviratne. 2019. SafeMR: Privacy-aware Visual Information Protection for Mobile Mixed Reality. In 2019 IEEE 44th Conference on Local Computer Networks (LCN). IEEE, Osnabrueck, Germany, 254–257. https://doi.org/10.1109/LCN44214.2019.8990850
[13]
Jaybie Agullo de Guzman, Kanchana Thilakarathna, and Aruna Seneviratne. 2019. Security and privacy approaches in mixed reality: A literature survey. ACM Computing Surveys (CSUR) 52, 6 (2019), 1–37.
[14]
Tamara Denning, Zakariya Dehlawi, and Tadayoshi Kohno. 2014. In Situ with Bystanders of Augmented Reality Glasses: Perspectives on Recording and Privacy-Mediating Technologies. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (Toronto, Ontario, Canada) (CHI ’14). Association for Computing Machinery, New York, NY, USA, 2377–2386. https://doi.org/10.1145/2556288.2557352
[15]
Ellysse Dick. 2021. Balancing user privacy and innovation in augmented and virtual reality. Technical Report. Information Technology and Innovation Foundation.
[16]
Tamara Dinev and Paul Hart. 2006. An extended privacy calculus model for e-commerce transactions. Information systems research 17, 1 (2006), 61–80.
[17]
Youngwook Do, Frederik Brudy, George W Fitzmaurice, and Fraser Anderson. 2023. Vice VRsa: Balancing Bystander’s and VR user’s Privacy through Awareness Cues Inside and Outside VR. In Graphics Interface 2023-second deadline. Canadian Human-Computer Communications Society, Victoria, BC, Canada, 10 pages.
[18]
Ben Egliston and Marcus Carter. 2023. Examining visions of surveillance in Oculus’ data and privacy policies, 2014–2020. Media International Australia 188, 1 (2023), 52–66. https://doi.org/10.1177/1329878X211041670
[19]
Franz Faul, Edgar Erdfelder, Axel Buchner, and Albert-Georg Lang. 2009. Statistical power analyses using G* Power 3.1: Tests for correlation and regression analyses. Behavior research methods 41, 4 (2009), 1149–1160.
[20]
Yuanyuan Feng, Yaxing Yao, and Norman Sadeh. 2021. A Design Space for Privacy Choices: Towards Meaningful Privacy Control in the Internet of Things. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems (Yokohama, Japan) (CHI ’21). Association for Computing Machinery, New York, NY, USA, Article 64, 16 pages. https://doi.org/10.1145/3411764.3445148
[21]
Janet Finch. 1987. The vignette technique in survey research. Sociology 21, 1 (1987), 105–114.
[22]
Andrea Gallardo, Chris Choy, Jaideep Juneja, Efe Bozkir, Camille Cobb, Lujo Bauer, and Lorrie Cranor. 2023. Speculative Privacy Concerns About AR Glasses Data Collection. Proceedings on Privacy Enhancing Technologies 4 (2023), 416–435.
[23]
Ceenu George, Manuel Demmler, and Heinrich Hussmann. 2018. Intelligent Interruptions for IVR: Investigating the Interplay between Presence, Workload and Attention. In Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems (Montreal QC, Canada) (CHI EA ’18). Association for Computing Machinery, New York, NY, USA, 1–6. https://doi.org/10.1145/3170427.3188686
[24]
Jan Gugenheimer, Wen-Jie Tseng, Abraham Hani Mhaidli, Jan Ole Rixen, Mark McGill, Michael Nebeling, Mohamed Khamis, Florian Schaub, and Sanchari Das. 2022. Novel Challenges of Safety, Security and Privacy in Extended Reality. In Extended Abstracts of the 2022 CHI Conference on Human Factors in Computing Systems (New Orleans, LA, USA) (CHI EA ’22). Association for Computing Machinery, New York, NY, USA, Article 108, 5 pages. https://doi.org/10.1145/3491101.3503741
[25]
Aniket Gulhane, Akhil Vyas, Reshmi Mitra, Roland Oruche, Gabriela Hoefer, Samaikya Valluripally, Prasad Calyam, and Khaza Anuarul Hoque. 2019. Security, privacy and safety risk assessment for virtual reality learning environment applications. In 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC). IEEE, Las Vegas, NV, USA, 1–9.
[26]
Hana Habib and Lorrie Faith Cranor. 2022. Evaluating the usability of privacy choice mechanisms. In Eighteenth Symposium on Usable Privacy and Security (SOUPS). USENIX Association, Boston, MA, 273–289.
[27]
Hilda Hadan and Sameer Patil. 2020. Understanding perceptions of smart devices. In Financial Cryptography and Data Security: FC 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia, February 14, 2020, Revised Selected Papers 24. Springer International Publishing, Kota Kinabalu, Sabah, Malaysia, 102–121.
[28]
David Harborth and Sebastian Pape. 2021. Investigating privacy concerns related to mobile augmented reality apps–A vignette based online experiment. Computers in Human Behavior 122 (2021), 106833.
[29]
M Brandon Haworth, Melanie Baljko, and Petros Faloutsos. 2012. PhoVR: a virtual reality system to treat phobias. In Proceedings of the 11th ACM SIGGRAPH International Conference on Virtual-Reality Continuum and its Applications in Industry. ACM, New York, USA, 171–174.
[30]
Brittan Heller. 2020. Watching Androids Dream of Electric Sheep: Immersive Technology, Biometric Psychography, and the Law. Vand. J. Ent. & Tech. L. 23 (2020), 1.
[31]
Yue Huang, Borke Obada-Obieh, and Konstantin Beznosov. 2020. Amazon vs. my brother: How users of shared smart speakers perceive and cope with privacy risks. In Proceedings of the 2020 CHI conference on human factors in computing systems. Association for Computing Machinery, New York, NY, USA, 1–13.
[32]
Fortune Business Insights. 2021. Extended Reality Market Size, Share & Industry Analysis, By Type (Consumer Engagement, Business Engagement), By Application (Virtual Reality (VR), Augmented Reality (AR), Mixed Reality (MR)), By Industry Vertical (BFSI, Healthcare & Life Sciences, Telecommunications & IT, Government & Public Sector, Manufacturing, Consumer Goods & Retail, Media & Entertainment, Others) And Regional Forecast 2022-2029. Last access on October 21st, 2022.
[33]
Joseph B Kadane and Nicole A Lazar. 2004. Methods and criteria for model selection. Journal of the American statistical Association 99, 465 (2004), 279–290.
[34]
Kan_G3. 2021. Popup notification while playing VR. Reddit. https://www.reddit.com/r/HPReverb/comments/lrfcq0/popup_notification_while_playing_vr/. Last accessed on January 26, 2023.
[35]
Predrag Klasnja, Sunny Consolvo, Tanzeem Choudhury, Richard Beckwith, and Jeffrey Hightower. 2009. Exploring privacy concerns about personal sensing. In International Conference on Pervasive Computing. Springer, Berlin, Heidelberg, 176–183.
[36]
Kiron Lebeck, Kimberly Ruth, Tadayoshi Kohno, and Franziska Roesner. 2018. Towards security and privacy for multi-user augmented reality: Foundations with end users. In 2018 IEEE Symposium on Security and Privacy (SP). IEEE, San Francisco, CA, USA, 392–408.
[37]
Hosub Lee and Alfred Kobsa. 2016. Understanding user privacy in Internet of Things environments. In 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT). IEEE, Reston, VA, USA, 407–412.
[38]
Pedro Giovanni Leon, Blase Ur, Yang Wang, Manya Sleeper, Rebecca Balebako, Richard Shay, Lujo Bauer, Mihai Christodorescu, and Lorrie Faith Cranor. 2013. What Matters to Users? Factors That Affect Users’ Willingness to Share Information with Online Advertisers. In Proceedings of the Ninth Symposium on Usable Privacy and Security (Newcastle, United Kingdom) (SOUPS ’13). Association for Computing Machinery, New York, NY, USA, Article 7, 12 pages. https://doi.org/10.1145/2501604.2501611
[39]
Jialiu Lin, Shahriyar Amini, Jason I Hong, Norman Sadeh, Janne Lindqvist, and Joy Zhang. 2012. Expectation and purpose: understanding users’ mental models of mobile app privacy through crowdsourcing. In Proceedings of the 2012 ACM conference on ubiquitous computing. Association for Computing Machinery, New York, NY, USA, 501–510.
[40]
Naresh K Malhotra, Sung S Kim, and James Agarwal. 2004. Internet users’ information privacy concerns (IUIPC): The construct, the scale, and a causal model. Information systems research 15, 4 (2004), 336–355.
[41]
Divine Maloney, Guo Freeman, and Andrew Robb. 2021. Social virtual reality: ethical considerations and future directions for an emerging research space. In 2021 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW). IEEE, Lisbon, Portugal, 271–277.
[42]
Divine Maloney, Guo Freeman, and Andrew Robb. 2021. Stay Connected in An Immersive World: Why Teenagers Engage in Social Virtual Reality. In Proceedings of the 20th Annual ACM Interaction Design and Children Conference (Athens, Greece) (IDC ’21). Association for Computing Machinery, New York, NY, USA, 69–79. https://doi.org/10.1145/3459990.3460703
[43]
Divine Maloney, Samaneh Zamanifard, and Guo Freeman. 2020. Anonymity vs. familiarity: Self-disclosure and privacy in social virtual reality. In 26th ACM Symposium on Virtual Reality Software and Technology. Association for Computing Machinery, New York, NY, USA, 1–9.
[44]
Florian Mathis. 2022. Moving Usable Security and Privacy Research Out of the Lab: Adding Virtual Reality to the Research Arsenal.
[45]
Richard McPherson, Suman Jana, and Vitaly Shmatikov. 2015. No Escape From Reality: Security and Privacy of Augmented Reality Browsers. In Proceedings of the 24th International Conference on World Wide Web (Florence, Italy) (WWW ’15). International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, CHE, 743–753. https://doi.org/10.1145/2736277.2741657
[46]
Abraham Hani Mhaidli and Florian Schaub. 2021. Identifying Manipulative Advertising Techniques in XR Through Scenario Construction. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems (Yokohama, Japan) (CHI ’21). Association for Computing Machinery, New York, NY, USA, Article 296, 18 pages. https://doi.org/10.1145/3411764.3445253
[47]
Mark Roman Miller, Fernanda Herrera, Hanseul Jun, James A Landay, and Jeremy N Bailenson. 2020. Personal identifiability of user tracking data during observation of 360-degree VR video. Scientific Reports 10, 1 (2020), 1–10.
[48]
Pardis Emami Naeini, Sruti Bhagavatula, Hana Habib, Martin Degeling, Lujo Bauer, Lorrie Faith Cranor, and Norman Sadeh. 2017. Privacy expectations and preferences in an IoT world. In Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). USENIX Association, Santa Clara, CA, 399–412.
[49]
Helen Nissenbaum. 2004. Privacy as contextual integrity. Washington Law Review 79 (2004), 119.
[50]
Kyle O’Brien. 2019. Coca-Cola embraces augmented reality with interactive experience. The Drum. https://www.thedrum.com/news/2019/09/10/coca-cola-embraces-ar-interactive-experience. Last accessed on January 6, 2023.
[51]
Fiachra O’Brolcháin, Tim Jacquemard, David Monaghan, Noel O’Connor, Peter Novitzky, and Bert Gordijn. 2016. The convergence of virtual reality and social networks: threats to privacy and autonomy. Science and engineering ethics 22, 1 (2016), 1–29.
[52]
Joseph O’Hagan, Pejman Saeghe, Jan Gugenheimer, Daniel Medeiros, Karola Marky, Mohamed Khamis, and Mark McGill. 2023. Privacy-Enhancing Technology and Everyday Augmented Reality: Understanding Bystanders’ Varying Needs for Awareness and Consent. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 6, 4 (2023), 1–35.
[53]
Antti Oulasvirta, Aurora Pihlajamaa, Jukka Perkiö, Debarshi Ray, Taneli Vähäkangas, Tero Hasu, Niklas Vainio, and Petri Myllymäki. 2012. Long-term effects of ubiquitous surveillance in the home. In Proceedings of the 2012 ACM Conference on Ubiquitous Computing. Association for Computing Machinery, New York, NY, USA, 41–50.
[54]
Zhigeng Pan, Adrian David Cheok, Hongwei Yang, Jiejie Zhu, and Jiaoying Shi. 2006. Virtual reality and mixed reality for virtual learning environments. Computers & graphics 30, 1 (2006), 20–28.
[55]
Sameer Patil, Roberto Hoyle, Roman Schlegel, Apu Kapadia, and Adam J Lee. 2015. Interrupt now or inform later? Comparing immediate and delayed privacy feedback. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. Association for Computing Machinery, New York, NY, USA, 1415–1418.
[56]
Ken Pfeuffer, Matthias J Geiger, Sarah Prange, Lukas Mecke, Daniel Buschek, and Florian Alt. 2019. Behavioural biometrics in vr: Identifying people from body motion and relations in virtual reality. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery, New York, NY, USA, 1–12.
[57]
Ismo Rakkolainen, Ahmed Farooq, Jari Kangas, Jaakko Hakulinen, Jussi Rantala, Markku Turunen, and Roope Raisamo. 2021. Technologies for multimodal interaction in extended reality—a scoping review. Multimodal Technologies and Interaction 5, 12 (2021), 81.
[58]
REGULATION (EU) 2016/679 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL. 2016. Art. 25 GDPRData protection by design and by default.
[59]
Jan Ole Rixen, Teresa Hirzle, Mark Colley, Yannick Etzel, Enrico Rukzio, and Jan Gugenheimer. 2021. Exploring augmented visual alterations in interpersonal communication. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery, New York, NY, USA, 1–11.
[60]
Franziska Roesner, Tadayoshi Kohno, and David Molnar. 2014. Security and privacy for augmented reality systems. Commun. ACM 57, 4 (2014), 88–96.
[61]
Rufat Rzayev, Sven Mayer, Christian Krauter, and Niels Henze. 2019. Notification in VR: The Effect of Notification Placement, Task and Environment. In Proceedings of the Annual Symposium on Computer-Human Interaction in Play (Barcelona, Spain) (CHI PLAY ’19). Association for Computing Machinery, New York, NY, USA, 199–211. https://doi.org/10.1145/3311350.3347190
[62]
Florian Schaub, Rebecca Balebako, Adam L Durity, and Lorrie Faith Cranor. 2015. A design space for effective privacy notices. In Eleventh Symposium on Usable Privacy and Security (SOUPS). USENIX Association, Ottawa, Canada, 1–17.
[63]
Daniel M Shafer, Corey P Carbonara, and Michael F Korpi. 2019. Factors affecting enjoyment of virtual reality games: a comparison involving consumer-grade virtual reality technology. Games for health journal 8, 1 (2019), 15–23.
[64]
Joon-Ho Shin, Si Bog Park, and Seong Ho Jang. 2015. Effects of game-based virtual reality on health-related quality of life in chronic stroke patients: a randomized, controlled study. Computers in biology and medicine 63 (2015), 92–98.
[65]
N Craig Smith, Daniel G Goldstein, and Eric J Johnson. 2013. Choice without awareness: Ethical and policy implications of defaults. Journal of Public Policy & Marketing 32, 2 (2013), 159–172.
[66]
Daniel J Solove. 2012. Introduction: Privacy self-management and the consent dilemma. Harv. L. Rev. 126 (2012), 1880.
[67]
Maximilian Speicher, Brian D Hall, and Michael Nebeling. 2019. What is mixed reality?. In Proceedings of the 2019 CHI conference on human factors in computing systems. Association for Computing Machinery, New York, NY, USA, 1–15.
[68]
Cass R Sunstein. 2014. Why nudge?: The politics of libertarian paternalism. Yale University Press, New Haven, Connecticut, USA.
[69]
Meta Oculus Team. 2015. FIRST LOOK AT THE RIFT, SHIPPING Q1 2016. https://www.oculus.com/blog/first-look-at-the-rift-shipping-q1-2016/. Last accessed on November 21, 2022.
[70]
The XR Safety Initiative (XRSI). 2021. 1st XR Data Classification Roundtable Report. XR Safety Week 2021. The XR Safety Initiative (XRSI). Last accessed on October 20th, 2022.
[71]
Rahmadi Trimananda, Hieu Le, Hao Cui, Janice Tran Ho, Anastasia Shuba, and Athina Markopoulou. 2022. { OVRseen} : Auditing Network Traffic and Privacy Policies in Oculus { VR}. In 31st USENIX security symposium (USENIX security 22). USENIX Association, Boston, MA, 3789–3806.
[72]
Janice Y Tsai, Patrick Kelley, Paul Drielsma, Lorrie Faith Cranor, Jason Hong, and Norman Sadeh. 2009. Who’s viewed you? The impact of feedback in a mobile location-sharing application. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. Association for Computing Machinery, New York, NY, USA, 2003–2012.
[73]
Max Van Kleek, Ilaria Liccardi, Reuben Binns, Jun Zhao, Daniel J Weitzner, and Nigel Shadbolt. 2017. Better the devil you know: Exposing the data sharing practices of smartphone apps. In Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems. Association for Computing Machinery, New York, NY, USA, 5208–5220.
[74]
Robert F Woolson. 2007. Wilcoxon signed-rank test., 3 pages.
[75]
XR Safety Initiative (XRSI). 2020. The XRSI Definition of Extended Reality (XR). XR Safety Initiative Standard Publication XR 001. The XR Safety Initiative (XRSI). Last accessed on October 16th, 2022.
[76]
Toshihiko Yamakami. 2020. A privacy threat model in xr applications. In International Conference on Emerging Internetworking, Data & Web Technologies. Springer, Berlin, Heidelberg, 384–394.
[77]
Yaxing Yao, Justin Reed Basdeo, Smirity Kaushik, and Yang Wang. 2019. Defending my castle: A co-design study of privacy mechanisms for smart homes. In Proceedings of the 2019 chi conference on human factors in computing systems. Association for Computing Machinery, New York, NY, USA, 1–12.
[78]
Rafael Yuste, Jared Genser, and Stephanie Herrmann. 2021. It’s time for neuro-rights. Horizons 18 (2021), 154–164.

Cited By

View all
  • (2024)Feeling Uneasy in VR? Measuring User Perception of Data Collection Practices in Extended RealityACM Symposium on Applied Perception 202410.1145/3675231.3678873(1-2)Online publication date: 30-Aug-2024
  • (2024)Deceived by Immersion: A Systematic Analysis of Deceptive Design in Extended RealityACM Computing Surveys10.1145/365994556:10(1-25)Online publication date: 14-May-2024
  • (2024)User Safety and Security in the Metaverse: A Critical ReviewIEEE Open Journal of the Communications Society10.1109/OJCOMS.2024.33970445(5467-5487)Online publication date: 2024

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing Systems
May 2024
18961 pages
ISBN:9798400703300
DOI:10.1145/3613904
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 11 May 2024

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Augmented Reality
  2. Extended Reality
  3. Mixed Reality
  4. Privacy Perception
  5. Privacy-Seeking Strategies
  6. User privacy
  7. Virtual Reality

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Funding Sources

Conference

CHI '24

Acceptance Rates

Overall Acceptance Rate 6,199 of 26,314 submissions, 24%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)750
  • Downloads (Last 6 weeks)178
Reflects downloads up to 28 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Feeling Uneasy in VR? Measuring User Perception of Data Collection Practices in Extended RealityACM Symposium on Applied Perception 202410.1145/3675231.3678873(1-2)Online publication date: 30-Aug-2024
  • (2024)Deceived by Immersion: A Systematic Analysis of Deceptive Design in Extended RealityACM Computing Surveys10.1145/365994556:10(1-25)Online publication date: 14-May-2024
  • (2024)User Safety and Security in the Metaverse: A Critical ReviewIEEE Open Journal of the Communications Society10.1109/OJCOMS.2024.33970445(5467-5487)Online publication date: 2024

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Full Text

View this article in Full Text.

Full Text

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media