{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T15:56:21Z","timestamp":1776095781918,"version":"3.50.1"},"reference-count":55,"publisher":"Informa UK Limited","issue":"4","funder":[{"DOI":"10.13039\/100008982","name":"Qatar National Research Fund","doi-asserted-by":"publisher","award":["GSRA9-L-2-0605-22108"],"award-info":[{"award-number":["GSRA9-L-2-0605-22108"]}],"id":[{"id":"10.13039\/100008982","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100008982","name":"Qatar National Research Fund","doi-asserted-by":"publisher","award":["NPRP14C-0916-210015- SP-470"],"award-info":[{"award-number":["NPRP14C-0916-210015- SP-470"]}],"id":[{"id":"10.13039\/100008982","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Qatar University High Impact","award":["QU-HIG 23-24\/127"],"award-info":[{"award-number":["QU-HIG 23-24\/127"]}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Human\u2013Computer Interaction"],"published-print":{"date-parts":[[2025,2,16]]},"DOI":"10.1080\/10447318.2024.2374091","type":"journal-article","created":{"date-parts":[[2024,7,12]],"date-time":"2024-07-12T07:39:13Z","timestamp":1720769953000},"page":"1967-1984","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":24,"title":["Avatar Privacy Challenges in the Metaverse: A Comprehensive Review and Future Directions"],"prefix":"10.1080","volume":"41","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3481-7695","authenticated-orcid":false,"given":"Somaya","family":"Eltanbouly","sequence":"first","affiliation":[{"name":"Computer Science and Engineering Department, Qatar University","place":["Doha, Qatar"]}]},{"given":"Osama","family":"Halabi","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering Department, Qatar University","place":["Doha, Qatar"]}]},{"given":"Junaid","family":"Qadir","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering Department, Qatar University","place":["Doha, Qatar"]}]}],"member":"301","published-online":{"date-parts":[[2024,7,12]]},"reference":[{"key":"e_1_3_3_2_1","doi-asserted-by":"publisher","DOI":"10.3991\/ijim.v16i13.33187"},{"key":"e_1_3_3_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MetaCom57706.2023.00147"},{"key":"e_1_3_3_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359202"},{"key":"e_1_3_3_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/GEM59776.2023.10390314"},{"key":"e_1_3_3_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2022.102542"},{"key":"e_1_3_3_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MTS.2018.2826060"},{"key":"e_1_3_3_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3485345"},{"key":"e_1_3_3_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642144"},{"key":"e_1_3_3_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544549.3585840"},{"key":"e_1_3_3_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3512932"},{"key":"e_1_3_3_12_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2023.2290380"},{"key":"e_1_3_3_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2023.02.008"},{"key":"e_1_3_3_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2022.105581"},{"key":"e_1_3_3_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3584931.3607004"},{"key":"e_1_3_3_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.110460"},{"key":"e_1_3_3_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-81111-2_16\/COVER"},{"key":"e_1_3_3_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jretconser.2023.103382"},{"key":"e_1_3_3_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/VRW55335.2022.00076"},{"key":"e_1_3_3_20_1","author":"K\u00fcrt\u00fcnl\u00fco\u011flu B. A.","year":"2022","unstructured":"K\u00fcrt\u00fcnl\u00fco\u011flu, B. A., & Karaarslan, E. (2022). Security of virtual reality authentication methods in metaverse: An overview (9). https:\/\/arxiv.org\/abs\/2209.06447v1","journal-title":"Security of virtual reality authentication methods in metaverse: An overview (9)."},{"key":"e_1_3_3_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-79026-8_7"},{"key":"e_1_3_3_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MetaCom57706.2023.00090"},{"key":"e_1_3_3_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2019.102128"},{"key":"e_1_3_3_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/MetaCom57706.2023.00117"},{"key":"e_1_3_3_25_1","doi-asserted-by":"publisher","DOI":"10.3389\/frvir.2022.974652"},{"key":"e_1_3_3_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2023.3345416"},{"key":"e_1_3_3_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385956.3418967"},{"key":"e_1_3_3_28_1","unstructured":"Meta. (n.d.a.). Block or unblock someone in meta horizon worlds\u2014meta store. Retrieved June 18 2023 from https:\/\/www.meta.com\/help\/quest\/articles\/horizon\/safety-and-privacy-in-horizon-worlds\/block-or-unblock-horizon\/"},{"key":"e_1_3_3_29_1","unstructured":"Meta. (n.d.b.). Use poll to remove in meta horizon worlds\u2014meta store. Retrieved June 18 2023 from https:\/\/www.meta.com\/help\/quest\/articles\/horizon\/safety-and-privacy-in-horizon-worlds\/poll-to-remove-horizon-worlds\/"},{"key":"e_1_3_3_30_1","unstructured":"Meta. (n.d.c.). Use voice mode in meta horizon worlds\u2014meta store. Retrieved June 18 2023 from https:\/\/www.meta.com\/help\/quest\/articles\/horizon\/safety-and-privacy-in-horizon-worlds\/use-voice-mode-horizon-worlds\/"},{"key":"e_1_3_3_31_1","unstructured":"Nair V. Garrido G. M. Song D. (2022a). Exploring the unprecedented privacy risks of the metaverse (p. 7). http:\/\/arxiv.org\/abs\/2207.13176"},{"key":"e_1_3_3_32_1","unstructured":"Nair V. Garrido G. M. Song D. (2022b). Going incognito in the metaverse (p. 8). http:\/\/arxiv.org\/abs\/2208.05604"},{"key":"e_1_3_3_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2023.3290955"},{"key":"e_1_3_3_34_1","doi-asserted-by":"publisher","DOI":"10.1186\/S13643-021-01626-4\/FIGURES\/1"},{"key":"e_1_3_3_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3614426"},{"key":"e_1_3_3_36_1","unstructured":"Rec Room. (n.d.). Comfort options\u2014Rec room. Retrieved June 18 2023 from https:\/\/recroom.com\/comfortandsafety"},{"key":"e_1_3_3_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3610027"},{"key":"e_1_3_3_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581090"},{"key":"e_1_3_3_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3357938"},{"key":"e_1_3_3_40_1","unstructured":"Sharma V. (2023 December 13). Introducing a personal boundary for Horizon Worlds and venues. Meta. Retrieved June 18 2023 from https:\/\/about.fb.com\/news\/2022\/02\/personal-boundary-horizon\/"},{"key":"e_1_3_3_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/VR.2017.7892258"},{"key":"e_1_3_3_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2023.09.020"},{"key":"e_1_3_3_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3257029"},{"key":"e_1_3_3_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3366527"},{"key":"e_1_3_3_45_1","unstructured":"Tuli E. A. Zainudin A. Ahmed Shanto M. J. Lee J. M. & Kim D.-S. (2023 February 8). MediaPipe-based real-time interactive avatar generation for metaverse [Paper presentation]. Proceedings of the Symposium of the Korean Institute of Communications and Information Sciences. Gangwon."},{"key":"e_1_3_3_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3476078"},{"key":"e_1_3_3_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/OJCS.2023.3300321"},{"key":"e_1_3_3_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/IOTM.001.2200266"},{"key":"e_1_3_3_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2023.3263909"},{"key":"e_1_3_3_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3202047"},{"key":"e_1_3_3_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3519391.3519392"},{"key":"e_1_3_3_52_1","unstructured":"Wu J. Gan W. Chen Z. Wan S. & Lin H. (2023). AI-generated content (AIGC): A survey. arXiv:bib1 [cs.AI]."},{"key":"e_1_3_3_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/OJCS.2022.3188249"},{"key":"e_1_3_3_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/VRW52623.2021.00256"},{"key":"e_1_3_3_55_1","unstructured":"Young K. Yang R. Yingling C. Dorn V. Manzon-Gutzman T. Rudi O. (2023). Personal space bubble in VR environments. https:\/\/patent.nweon.com\/28494"},{"key":"e_1_3_3_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNC57223.2023.10074107"}],"container-title":["International Journal of Human\u2013Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/10447318.2024.2374091","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,19]],"date-time":"2025-02-19T06:53:55Z","timestamp":1739948035000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/10447318.2024.2374091"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,12]]},"references-count":55,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,2,16]]}},"alternative-id":["10.1080\/10447318.2024.2374091"],"URL":"https:\/\/doi.org\/10.1080\/10447318.2024.2374091","relation":{},"ISSN":["1044-7318","1532-7590"],"issn-type":[{"value":"1044-7318","type":"print"},{"value":"1532-7590","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,7,12]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hihc20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hihc20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2024-01-20","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-05-26","order":1,"name":"revised","label":"Revised","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-06-19","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-07-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}