{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T05:39:26Z","timestamp":1773207566375,"version":"3.50.1"},"reference-count":76,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,4,11]],"date-time":"2025-04-11T00:00:00Z","timestamp":1744329600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,4,11]],"date-time":"2025-04-11T00:00:00Z","timestamp":1744329600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,6]]},"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>In the rapidly evolving landscape of Extended Reality technologies, including Virtual Reality, Augmented Reality, and Mixed Reality, there is a demand for security and privacy to co-exist harmoniously with usability and user experience. The delicate balance of usability, user experience, security, and privacy takes on a keen importance. This research paper delves into unique conflicting factors and explores the strategies in achieving this delicate balance, shedding lights on the overlapping elements between usability, user experience, security and privacy in XR environments. The research takes a multifaceted approach, integrating theoretical analysis with practical insights derived from real-world case studies and an empirical user study. The user study, conducted to uncover user preferences toward achieving a balance between these conflicting factors, provides data-driven insights into the interaction of usability, user experience, privacy, and security. The data analysis performed using Python reveals how security, privacy, usability and user experience can be seamlessly integrated into XR ensuring that technology not only meets user expectations but also protects sensitive information. Through a multidimensional approach, this study reveals insights into how privacy and security considerations can be woven into the fabric of XR, enriching user experiences while cultivating a culture of trust and empowerment. This study is an extension of our previous work \u201dembracing XR systems, not compromising on privacy and security\u201d and aims to guide the design of XR environment that are both user-friendly and safe and secure, ultimately establishing a culture of trust and empowerment.\n<\/jats:p>","DOI":"10.1007\/s10207-025-01025-z","type":"journal-article","created":{"date-parts":[[2025,4,11]],"date-time":"2025-04-11T14:14:31Z","timestamp":1744380871000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Balancing usability, user experience, security and privacy in XR systems: a multidimensional approach"],"prefix":"10.1007","volume":"24","author":[{"given":"Rebecca","family":"Acheampong","sequence":"first","affiliation":[]},{"given":"Titus Constantin","family":"Balan","sequence":"additional","affiliation":[]},{"given":"Dorin-Mircea","family":"Popovici","sequence":"additional","affiliation":[]},{"given":"Emmanuel","family":"Tuyishime","sequence":"additional","affiliation":[]},{"given":"Alexandre","family":"Rekeraho","sequence":"additional","affiliation":[]},{"given":"Gheorghe Daniel","family":"Voinea","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,11]]},"reference":[{"key":"1025_CR1","unstructured":"What is Human-Computer Interaction (HCI)? | IxDF. . Accessed Aug. 27, 2023. [Online]. Available: (2023). https:\/\/www.interaction-design.org\/literature\/topics\/human-computer-interaction"},{"key":"1025_CR2","doi-asserted-by":"publisher","unstructured":"Peacock, C.: Steve Jobs: The Human Logo, NK, 1(2), (2007). https:\/\/doi.org\/10.31165\/nk.2007.12.18.","DOI":"10.31165\/nk.2007.12.18."},{"key":"1025_CR3","unstructured":"Human-Computer Interaction: Everything You Need To Know. Accessed: Aug. 27, [Online]. Available: (2023). https:\/\/aelaschool.com\/en\/interactiondesign\/human-computer-interaction-everything-you-need-to-know\/"},{"issue":"4","key":"1025_CR4","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/s11936-019-0722-7","volume":"21","author":"C Andrews","year":"2019","unstructured":"Andrews, C., Southworth, M.K., Silva, J.N.A., Silva, J.R.: Extended reality in medical practice. Curr. Treat Opt. Cardio. Med. 21(4), 18 (2019). https:\/\/doi.org\/10.1007\/s11936-019-0722-7","journal-title":"Curr. Treat Opt. Cardio. Med."},{"issue":"11","key":"1025_CR5","doi-asserted-by":"publisher","first-page":"3960","DOI":"10.3390\/app10113960","volume":"10","author":"M Serras","year":"2020","unstructured":"Serras, M., Garc\u00eda-Sardi\u00f1a, L., Sim\u00f5es, B., \u00c1lvarez, H., Arambarri, J.: Dialogue enhanced extended reality: interactive system for the operator 4.0. Appl. Sci. 10(11), 3960 (2020). https:\/\/doi.org\/10.3390\/app10113960","journal-title":"Appl. Sci."},{"key":"1025_CR6","first-page":"24","volume":"1","author":"MM Monique","year":"2021","unstructured":"Monique, M.M., Morrow, J.: The IEEE global initiative on ethics of extended reality (XR) report-extended reality (XR) and the erosion of anonymity and privacy. IEEE Xplore 1, 24 (2021)","journal-title":"IEEE Xplore"},{"key":"1025_CR7","unstructured":"Giaretta, A.: Security and privacy in virtual reality \u2013 a literature survey. arXiv. May 20, 2022. Accessed: May 03, [Online]. Available: (2023). http:\/\/arxiv.org\/abs\/2205.00208"},{"key":"1025_CR8","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1016\/j.procir.2021.01.124","volume":"98","author":"F Bellalouna","year":"2021","unstructured":"Bellalouna, F.: The augmented reality technology as enabler for the digitization of industrial business processes: case studies. Proc. CIRP. 98, 400\u2013405 (2021). https:\/\/doi.org\/10.1016\/j.procir.2021.01.124","journal-title":"Proc. CIRP."},{"issue":"3","key":"1025_CR9","first-page":"8","volume":"12","author":"NS Ali","year":"2017","unstructured":"Ali, N.S., Nasser, M.: Review of virtual reality trends (previous, current, and future directions), and their applications, technologies and technical issues. ARPN J. Eng. Appl. Sci. 12(3), 8 (2017)","journal-title":"ARPN J. Eng. Appl. Sci."},{"key":"1025_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103127","volume":"128","author":"S Qamar","year":"2023","unstructured":"Qamar, S., Anwar, Z., Afzal, M.: A systematic threat analysis and defense strategies for the metaverse and extended reality systems. Comput. Secur. 128, 103127 (2023). https:\/\/doi.org\/10.1016\/j.cose.2023.103127","journal-title":"Comput. Secur."},{"key":"1025_CR11","unstructured":"Chukwunonso, A. G., Njoku, J. N., Lee, J.-M., Kim,D.-S.: Security in Metaverse: A Closer Look. In ResearchGate. p. 3 (2023)"},{"key":"1025_CR12","unstructured":"Virtual Reality: Opportunities and Risks - INTENTA. Accessed: Aug. 03, [Online]. Available: (2023). https:\/\/intenta.digital\/perspectives\/virtual-reality-opportunities-risks\/"},{"key":"1025_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102840","volume":"121","author":"M Gale","year":"2022","unstructured":"Gale, M., Bongiovanni, I., Slapnicar, S.: Governing cybersecurity from the boardroom: challenges, drivers, and ways ahead. Comput Sec. 121, 102840 (2022). https:\/\/doi.org\/10.1016\/j.cose.2022.102840","journal-title":"Comput Sec."},{"key":"1025_CR14","doi-asserted-by":"crossref","unstructured":"Acheampong, R., Balan, T. C., Popovici, D.-M., Rekeraho, A.: Embracing XR System Without Compromising on Security and Privacy. In International Conference on Extended Reality, Switzerland AG 2023: Springer Nature, p. 16. [Online]. Available: (2023) https:\/\/link.springer.com\/chapter\/10.1007\/978-3-031-43401-3_7","DOI":"10.1007\/978-3-031-43401-3_7"},{"issue":"2","key":"1025_CR15","doi-asserted-by":"publisher","first-page":"550","DOI":"10.1109\/TDSC.2019.2907942","volume":"18","author":"P Casey","year":"2021","unstructured":"Casey, P., Baggili, I., Yarramreddy, A.: Immersive virtual reality attacks and the human joystick. IEEE Trans. Dependable Secure Comput. 18(2), 550\u2013562 (2021). https:\/\/doi.org\/10.1109\/TDSC.2019.2907942","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"1025_CR16","doi-asserted-by":"publisher","unstructured":"Kulal, S., Li, Z., Xin, T.: Security and privacy in virtual reality: a literature review. IIS. (2022). https:\/\/doi.org\/10.48009\/2_iis_2022_125.","DOI":"10.48009\/2_iis_2022_125."},{"key":"1025_CR17","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-023-10400-x","author":"YK Dwivedi","year":"2023","unstructured":"Dwivedi, Y.K., et al.: Exploring the Darkverse: a multi-perspective analysis of the negative societal impacts of the metaverse. Inf. Syst. Front. (2023). https:\/\/doi.org\/10.1007\/s10796-023-10400-x","journal-title":"Inf. Syst. Front."},{"issue":"6","key":"1025_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3359626","volume":"52","author":"JA de Guzman","year":"2019","unstructured":"de Guzman, J.A., Thilakarathna, K., Seneviratne, A.: Security and privacy approaches in mixed reality: a literature survey. ACM Comput. Surv. 52(6), 1\u201337 (2019). https:\/\/doi.org\/10.1145\/3359626","journal-title":"ACM Comput. Surv."},{"key":"1025_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3415187","volume":"4","author":"I Ahmad","year":"2020","unstructured":"Ahmad, I., Farzan, R., Kapadia, A., Lee, A.J.: Tangible privacy: towards user-centric sensor designs for bystander privacy. Proc. ACM Hum.-Comput. Interact. 4, 1\u201328 (2020). https:\/\/doi.org\/10.1145\/3415187","journal-title":"Proc. ACM Hum.-Comput. Interact."},{"key":"1025_CR20","doi-asserted-by":"publisher","unstructured":"King, A., Kaleem, F., Rabieh, K.: A Survey on Privacy Issues of Augmented Reality Applications. In 2020 IEEE Conference on Application, Information and Network Security (AINS). Kota Kinabalu, Malaysia: IEEE. Nov. pp. 32-40. (2020). https:\/\/doi.org\/10.1109\/AINS50155.2020.9315127.","DOI":"10.1109\/AINS50155.2020.9315127."},{"key":"1025_CR21","doi-asserted-by":"publisher","unstructured":"Wong, R. Y., Mulligan, D. K.: Bringing Design to the Privacy Table: Broadening \u2018Design\u2019 in \u2018Privacy by Design\u2019 Through the Lens of HCI. In Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems. Glasgow Scotland Uk: ACM. May pp. 1-17. (2019). https:\/\/doi.org\/10.1145\/3290605.3300492.","DOI":"10.1145\/3290605.3300492."},{"key":"1025_CR22","doi-asserted-by":"publisher","unstructured":"Chalhoub, G., Flechais, I., Nthala, N., Abu-Salma, R., Tom, E.: Factoring User Experience into the Security and Privacy Design of Smart Home Devices: A Case Study. In Extended Abstracts of the 2020 CHI Conference on Human Factors in Computing System. Honolulu HI USA: ACM. Apr. pp. 1-9. (2020) https:\/\/doi.org\/10.1145\/3334480.3382850.","DOI":"10.1145\/3334480.3382850."},{"key":"1025_CR23","doi-asserted-by":"publisher","unstructured":"Spanos, G. A., Maples, T. B.: Performance Study of a Selective Encryption Scheme for the Security of Networked, Real-Time Video. In Proceedings of Fourth International Conference on Computer Communications and Networks - IC3N\u201995. Sep. pp. 2-10. (1995) https:\/\/doi.org\/10.1109\/ICCCN.1995.540095","DOI":"10.1109\/ICCCN.1995.540095"},{"key":"1025_CR24","doi-asserted-by":"publisher","unstructured":"Grandi, J. G., Terrell, J., Lofca, K., Ruizvalencia, C., Kopper, R.: A Continuous Authentication Technique for XR Utilizing Time-Based One Time Passwords, Haptics, and Kinetic Activity. In 2023 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops (VRW). Mar. pp. 959-960. (2023). https:\/\/doi.org\/10.1109\/VRW58643.2023.00322.","DOI":"10.1109\/VRW58643.2023.00322."},{"key":"1025_CR25","doi-asserted-by":"publisher","unstructured":"Lewis, J., Sauro, J.: Usability and user experience: design and evaluation. pp. 972-1015. (2021). https:\/\/doi.org\/10.1002\/9781119636113.ch38.","DOI":"10.1002\/9781119636113.ch38."},{"key":"1025_CR26","unstructured":"lEEE Std 610.12. IEEE standard glossary of software engineering terminology. (1990)"},{"key":"1025_CR27","unstructured":"ISO\/IEC 25010:2011(en), Systems and software engineering - Systems and software Quality Requirements and Evaluation (SQuaRE) - System and software quality models. Accessed: Nov. 14, [Online]. Available: (2023). https:\/\/www.iso.org\/obp\/ui\/en\/#iso:std:iso-iec:25010:ed-1:v1:en"},{"issue":"7","key":"1025_CR28","doi-asserted-by":"publisher","first-page":"2343","DOI":"10.3390\/s18072343","volume":"18","author":"E Pedroli","year":"2018","unstructured":"Pedroli, E., et al.: Characteristics, usability, and users experience of a system combining cognitive and physical therapy in a virtual environment: positive bike. Sensors. 18(7), 2343 (2018). https:\/\/doi.org\/10.3390\/s18072343","journal-title":"Sensors."},{"key":"1025_CR29","doi-asserted-by":"publisher","unstructured":"Zagouras, P., Kalloniatis, C., Gritzalis, S.: Managing User Experience: Usability and Security in a New Era of Software Supremacy. In Human Aspects of Information Security, Privacy and Trust. vol. 10292. T. Tryfonas, Ed. In Lecture Notes in Computer Science, vol. 10292. Cham: Springer International Publishing, pp. 174-188. (2017). https:\/\/doi.org\/10.1007\/978-3-319-58460-7_12.","DOI":"10.1007\/978-3-319-58460-7_12."},{"key":"1025_CR30","doi-asserted-by":"publisher","first-page":"648","DOI":"10.1016\/j.procs.2018.08.221","volume":"135","author":"Y Arifin","year":"2018","unstructured":"Arifin, Y., Sastria, T.G., Barlian, E.: User experience metric for augmented reality application: a review. Proc. Comput. Sci. 135, 648\u2013656 (2018). https:\/\/doi.org\/10.1016\/j.procs.2018.08.221","journal-title":"Proc. Comput. Sci."},{"key":"1025_CR31","doi-asserted-by":"publisher","unstructured":"Ardito, C., Bernhaupt, R., Palanque, P., Sauer, S.: \"Handling Security, Usability, User Experience and Reliability in User-Centered Development Processes: IFIP WG 13.2 and WG 13.5 Workshop at INTERACT 2019,\u201d in Human-Computer Interaction - INTERACT 2019, vol. 11749, D. Lamas, F. Loizides, L. Nacke, H. Petrie, M. Winckler, and P. Zaphiris, Eds., in Lecture Notes in Computer Science, vol. 11749. , Cham: Springer International Publishing, pp. 759-762. (2019). https:\/\/doi.org\/10.1007\/978-3-030-29390-1_76","DOI":"10.1007\/978-3-030-29390-1_76"},{"key":"1025_CR32","unstructured":"Difference (and Relationship) Between Usability And User Experience. Accessed: Jan. 08, [Online]. Available: (2024) https:\/\/usabilitygeek.com\/the-difference-between-usability-and-user-experience\/#difference-usability-user-experience-1"},{"key":"1025_CR33","doi-asserted-by":"publisher","unstructured":"Altaf, A., Faily, S., Dogan, H., Mylonas, A., Thron, E.: Use-Case Informed Task Analysis for Secure and Usable Design Solutions in Rail. In Critical Information Infrastructures Security. vol. 13139. D. Percia David, A. Mermoud, and T. Maillart, Eds., in Lecture Notes in Computer Science, vol. 13139. , Cham: Springer International Publishing. pp. 168-185. (2021). https:\/\/doi.org\/10.1007\/978-3-030-93200-8_10.","DOI":"10.1007\/978-3-030-93200-8_10."},{"key":"1025_CR34","unstructured":"Cyberattack at loanDepot brings systems down - HousingWire. Accessed: Jan. 08, [Online]. Available: (2024). https:\/\/www.housingwire.com\/articles\/cyberattack-at-loandepot-brings-systems-down\/"},{"key":"1025_CR35","unstructured":"Cyber-Attacks Drain \\$1.84bn from Web3 in 2023 - Infosecurity Magazine. Accessed: Jan. 08, [Online]. Available: (2024). https:\/\/www.infosecurity-magazine.com\/news\/cyber-attacks-drain-web3"},{"issue":"5","key":"1025_CR36","doi-asserted-by":"publisher","first-page":"973","DOI":"10.1016\/j.jcss.2014.02.005","volume":"80","author":"J Jang-Jaccard","year":"2014","unstructured":"Jang-Jaccard, J., Nepal, S.: A survey of emerging threats in cybersecurity. J. Comput. Syst. Sci. 80(5), 973\u2013993 (2014). https:\/\/doi.org\/10.1016\/j.jcss.2014.02.005","journal-title":"J. Comput. Syst. Sci."},{"key":"1025_CR37","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102241","volume":"105","author":"C Pilton","year":"2021","unstructured":"Pilton, C., Faily, S., Henriksen-Bulmer, J.: Evaluating privacy - determining user privacy expectations on the web. Comput. Secur. 105, 102241 (2021). https:\/\/doi.org\/10.1016\/j.cose.2021.102241","journal-title":"Comput. Secur."},{"issue":"8","key":"1025_CR38","doi-asserted-by":"publisher","first-page":"156","DOI":"10.3390\/computers12080156","volume":"12","author":"RS Hirschprung","year":"2023","unstructured":"Hirschprung, R.S.: Is the privacy paradox a domain-specific phenomenon. Computers. 12(8), 156 (2023). https:\/\/doi.org\/10.3390\/computers12080156","journal-title":"Computers."},{"key":"1025_CR39","doi-asserted-by":"crossref","unstructured":"Rekeraho, A., Cotfas, D. T., Cotfas, P. A., B\u0103lan, T. C., Tuyishime, E., Acheampong, R.: \"Cybersecurity challenges in IoT-based smart renewable energy,\u201d (2023)","DOI":"10.21203\/rs.3.rs-2840528\/v1"},{"key":"1025_CR40","unstructured":"Orrick Data Breach Scope Increases - Spiceworks. Accessed: Jan. 08, [Online]. Available: (2024). https:\/\/www.spiceworks.com\/it-security\/data-security\/news\/orrick-data-breach\/"},{"key":"1025_CR41","unstructured":"Capital Health attack claimed by LockBit ransomware, risk of data leak. Accessed: Jan. 08, [Online]. Available: (2024). https:\/\/www.bleepingcomputer.com\/news\/security\/capital-health-attack-claimed-by-lockbit-ransomware-risk-of-data-leak\/"},{"key":"1025_CR42","doi-asserted-by":"crossref","unstructured":"Naqvi, B., Porras, J., Oyedeji, S., Ullah.: Aligning security, usability, user experience: a pattern approach. In Human Computer Interaction and Emerging Technologies: Adjunct Proceedings from the INTERACT 2020 Workshops. Cardiff University Press. May (2020)","DOI":"10.18573\/book3.aj"},{"key":"1025_CR43","doi-asserted-by":"publisher","unstructured":"Faily, S., Lyle, J., Flechais, I., Simpson, A.: Usability and Security by Design: A Case Study in Research and Development. In Proceedings 2015 Workshop on Usable Security. San Diego, CA: Internet Society. (2015). https:\/\/doi.org\/10.14722\/usec.2015.23012.","DOI":"10.14722\/usec.2015.23012."},{"key":"1025_CR44","doi-asserted-by":"publisher","unstructured":"Feth, D.: User-centric security: optimization of the security-usability trade-off. In Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, Bergamo Italy: ACM. Aug. pp. 1034-1037. (2015). https:\/\/doi.org\/10.1145\/2786805.2803195.","DOI":"10.1145\/2786805.2803195."},{"issue":"1","key":"1025_CR45","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1109\/JBHI.2019.2894552","volume":"24","author":"S Macis","year":"2020","unstructured":"Macis, S., et al.: Design and usability assessment of a multi-device SOA-based telecare framework for the elderly. IEEE J. Biomed. Health Inf. 24(1), 268\u2013279 (2020). https:\/\/doi.org\/10.1109\/JBHI.2019.2894552","journal-title":"IEEE J. Biomed. Health Inf."},{"key":"1025_CR46","doi-asserted-by":"publisher","unstructured":"George, C., et al.: Seamless and Secure VR: Adapting and Evaluating Established Authentication Systems for Virtual Reality. In Proceedings 2017 Workshop on Usable Security. San Diego, CA: Internet Society. (2017). https:\/\/doi.org\/10.14722\/usec.2017.23028.","DOI":"10.14722\/usec.2017.23028."},{"key":"1025_CR47","doi-asserted-by":"publisher","unstructured":"Nielsen, J.: Finding usability problems through heuristic evaluation. In Proceedings of the SIGCHI conference on Human factors in computing systems - CHI \u201992. Monterey. California, United States: ACM Press, (1992). pp. 373-380. https:\/\/doi.org\/10.1145\/142750.142834.","DOI":"10.1145\/142750.142834."},{"key":"1025_CR48","doi-asserted-by":"publisher","unstructured":"Feth, D., Polst, S.: Heuristics and Models for Evaluating the Usability of Security Measures. In Proceedings of Mensch und Computer 2019. Hamburg Germany: ACM, Sep. pp. 275-285. (2019). https:\/\/doi.org\/10.1145\/3340764.3340789.","DOI":"10.1145\/3340764.3340789."},{"key":"1025_CR49","unstructured":"Odeleye, B., Loukas, G., Spyridonis, F., Heartfield, R.: Detecting framerate-oriented cyber attacks on user experience in virtual reality. In USENIX Symposium on Usable Privacy and Security (SOUPS),: Vancouver. Canada 2021, 4 (2021)"},{"key":"1025_CR50","doi-asserted-by":"publisher","unstructured":"Jones, D., Ghasemi, S., Gra\u010danin, D., Azab, M.: Privacy, Safety, and Security in Extended Reality: User Experience Challenges for Neurodiverse Users. In HCI for Cybersecurity. Privacy and Trust. vol. 14045, A. Moallem, Ed. In Lecture Notes in Computer Science, vol. 14045. , Cham: Springer Nature Switzerland, pp. 511-528. (2023). https:\/\/doi.org\/10.1007\/978-3-031-35822-7_33.","DOI":"10.1007\/978-3-031-35822-7_33."},{"key":"1025_CR51","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2015.00026","author":"J Diemer","year":"2015","unstructured":"Diemer, J., Alpers, G.W., Peperkorn, H.M., Shiban, Y., M\u00fchlberger, A.: The impact of perception and presence on emotional reactions: a review of research in virtual reality. Front. Psychol. (2015). https:\/\/doi.org\/10.3389\/fpsyg.2015.00026","journal-title":"Front. Psychol."},{"issue":"3","key":"1025_CR52","doi-asserted-by":"publisher","first-page":"1755","DOI":"10.3390\/app12031755","volume":"12","author":"FV De Freitas","year":"2022","unstructured":"De Freitas, F.V., Gomes, M.V.M., Winkler, I.: Benefits and challenges of virtual-reality-based industrial usability testing and design reviews: a patents landscape and literature review. Appl. Sci. 12(3), 1755 (2022). https:\/\/doi.org\/10.3390\/app12031755","journal-title":"Appl. Sci."},{"key":"1025_CR53","unstructured":"Isaac, E.: Convenience and purposive sampling techniques: are they the same?. (2023)"},{"issue":"6","key":"1025_CR54","doi-asserted-by":"publisher","first-page":"703","DOI":"10.2501\/IJMR-2017-050","volume":"59","author":"M Goddard","year":"2017","unstructured":"Goddard, M.: The EU general data protection regulation (GDPR): European regulation that has a global impact. Int. J. Mark. Res. 59(6), 703\u2013705 (2017). https:\/\/doi.org\/10.2501\/IJMR-2017-050","journal-title":"Int. J. Mark. Res."},{"key":"1025_CR55","unstructured":"vTime (en-GB) - vTime (en-GB). Accessed: Jan. 16, [Online]. Available: (2024) https:\/\/vtime.net\/vtimexr"},{"key":"1025_CR56","unstructured":"Manage your unlock pattern with Meta Quest headsets | Quest Help | Meta Store. Accessed: Jan. 17, [Online]. Available: (2024). https:\/\/www.meta.com\/help\/quest\/articles\/getting-started\/getting-started-with-quest-2\/unlock-pattern-quest\/"},{"key":"1025_CR57","unstructured":"seaborn: statistical data visualization - seaborn 0.13.1 documentation. Accessed: Jan. 17, [Online]. Available: (2024). https:\/\/seaborn.pydata.org\/"},{"issue":"4","key":"1025_CR58","first-page":"1","volume":"6","author":"J O\u2019Hagan","year":"2023","unstructured":"O\u2019Hagan, J., Saeghe, P., Gugenheimer, J., Medeiros, D., Marky, K., Khamis, M., McGill, M.: Privacy-enhancing technology and everyday augmented reality: understanding bystanders\u2019 varying needs for awareness and consent. Proc. ACM Interact. Mob. Wear. Ubiquitous Technol. 6(4), 1\u201335 (2023)","journal-title":"Proc. ACM Interact. Mob. Wear. Ubiquitous Technol."},{"key":"1025_CR59","doi-asserted-by":"publisher","DOI":"10.1145\/3490237","author":"Y Zhao","year":"2002","unstructured":"Zhao, Y., Chen, J.: A survey on differential privacy for unstructured data content. ACM Comput. Surv. (2002). https:\/\/doi.org\/10.1145\/3490237","journal-title":"ACM Comput. Surv."},{"key":"1025_CR60","doi-asserted-by":"publisher","DOI":"10.1145\/3575879.3576002","author":"S Maragkoudaki","year":"2022","unstructured":"Maragkoudaki, S., Kalloniatis, C.: Virtual reality as a mean for increasing privacy awareness: the escape room example. ACM (2022). https:\/\/doi.org\/10.1145\/3575879.3576002","journal-title":"ACM"},{"key":"1025_CR61","doi-asserted-by":"publisher","unstructured":"Visoottiviseth, V., et al.: Lord of Secure: the Virtual Reality Game for Educating Network Security. 2018 Seventh ICT International Student Project Conference (ICT-ISPC). July. (2018). https:\/\/doi.org\/10.1109\/ICT-ISPC.2018.8523947.","DOI":"10.1109\/ICT-ISPC.2018.8523947."},{"key":"1025_CR62","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11948-014-9621-1","volume":"22","author":"F O\u2019Brolch\u00e1in","year":"2016","unstructured":"O\u2019Brolch\u00e1in, F., et al.: The convergence of virtual reality and social networks: threats to privacy and autonomy. science and engineering ethics. Sci. Eng. Ethics. 22, 1\u201329 (2016). https:\/\/doi.org\/10.1007\/s11948-014-9621-1","journal-title":"Sci. Eng. Ethics."},{"key":"1025_CR63","doi-asserted-by":"crossref","unstructured":"Jinghuai, L., Latoschik, M.E.: Digital body, identity and privacy in social virtual reality: a systematic review. Front. V. Real. 3 Nov. (2022)","DOI":"10.3389\/frvir.2022.974652"},{"key":"1025_CR64","unstructured":"Atluri, V., et al.: SMET: Semantic Mapping of CVE to ATT &CK and Its Application to Cybersecurity. Data and Applications Security and Privacy XXXVII, Springer Nature Switzerland. Vol. 13942. (2023). https:\/\/link.springer.com\/10.1007\/978-3-031-37586-6_15"},{"key":"1025_CR65","unstructured":"Marhold, A.: Balancing Availability and Confidentiality in IT Systems Used for Defence. Master\u2019s Programme in Computer and Information Engineering. Uppsala Univeritet. (2024)"},{"key":"1025_CR66","doi-asserted-by":"publisher","unstructured":"Gashi, L., et al.: A weighting model of cybersecurity parameters used for service placement. Int. J. Online Biomed. Eng. (iJOE). 19, 88\u201398 (2023). https:\/\/doi.org\/10.3991\/ijoe.v19i07.39285","DOI":"10.3991\/ijoe.v19i07.39285"},{"key":"1025_CR67","unstructured":"Anthony M. McCartney. The McCumber Cube Model. InfoSec Taskforce. April, (2024). https:\/\/infosectaskforce.com\/index.php\/2024\/04\/03\/the-mccumber-cube-model\/"},{"key":"1025_CR68","doi-asserted-by":"publisher","unstructured":"Holt, L.: A year affair with security: the development of a security program and manager. Proceedings of the 3rd annual conference on Information security curriculum development. InfoSecCD06: 2006 Information Security Curriculum Development Conference. pp. 130-135. Sept. (2022). https:\/\/doi.org\/10.1145\/1231047.1231076.","DOI":"10.1145\/1231047.1231076."},{"key":"1025_CR69","first-page":"79","volume":"6","author":"A Hudaib","year":"2019","unstructured":"Hudaib, A., Edinat, A.: A survey on security patterns and their classification schemes. Int. J. Sci. Eng. Res. 6, 79\u201390 (2019)","journal-title":"Int. J. Sci. Eng. Res."},{"key":"1025_CR70","unstructured":"Technical organisational measures GDPR-compliant | Wiki. https:\/\/www.robin-data.io\/en\/data-protection-and-data-security-academy\/wiki\/technical-organisational-measures-gdpr-compliant-implementation"},{"key":"1025_CR71","unstructured":"Privacy vs. Security: Exploring the Differences & Relationship | Okta. https:\/\/www.okta.com\/identity-101\/privacy-vs-security\/"},{"key":"1025_CR72","doi-asserted-by":"publisher","unstructured":"Lewis, J.: The System Usability Scale: Past, Present, and Future. International Journal of Human-Computer Interaction. pp. 1-14, March (2018). https:\/\/doi.org\/10.1080\/10447318.2018.1455307","DOI":"10.1080\/10447318.2018.1455307"},{"key":"1025_CR73","doi-asserted-by":"publisher","unstructured":"Lee, Youngjin.: Effect of uninterrupted time-on-task on students\u2019 success in Massive. Computers in Human Behavior. pp. 1-7, April (2018). https:\/\/doi.org\/10.1016\/j.chb.2018.04.043. Open Online Courses (MOOCs)","DOI":"10.1016\/j.chb.2018.04.043."},{"key":"1025_CR74","doi-asserted-by":"crossref","unstructured":"Norman, Donald A.: The Transmedia Design Challenge: Technology that is Pleasurable and Satisfying. Nielsen Norman Group, Northwestern University, and KAIST. pp. 1-4, Feb (2010)","DOI":"10.1145\/1649475.1649478"},{"key":"1025_CR75","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1016\/S0749-3797(99)00024-0","volume":"16","author":"D O\u2019Brien","year":"1999","unstructured":"O\u2019Brien, D.: Privacy, confidentiality, and security in information systems of state health agencies. Am. J. Preventive Med. 16, 351\u2013358 (1999). https:\/\/doi.org\/10.1016\/S0749-3797(99)00024-0","journal-title":"Am. J. Preventive Med."},{"key":"1025_CR76","doi-asserted-by":"crossref","first-page":"7","DOI":"10.7323\/ijaet\/v1_iss1_2","volume":"1","author":"T Jawahar","year":"2011","unstructured":"Jawahar, T., Nagesh, K.: Symmetric key cryptography algorithms simulation based performance analysis. Int. J. Emerg.Technol. Advan. Eng. 1, 7 (2011)","journal-title":"Int. J. Emerg.Technol. Advan. Eng."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01025-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-025-01025-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-025-01025-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T10:11:56Z","timestamp":1750500716000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-025-01025-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,11]]},"references-count":76,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,6]]}},"alternative-id":["1025"],"URL":"https:\/\/doi.org\/10.1007\/s10207-025-01025-z","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4,11]]},"assertion":[{"value":"11 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"We declare we do not have any Conflict of interest regarding the publication of this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"The study sought users\u2019 consent before their participation in the test. The tests performed followed the ethical guidelines of the university it took place.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"112"}}