{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T15:57:35Z","timestamp":1762876655114,"version":"3.45.0"},"reference-count":108,"publisher":"Oxford University Press (OUP)","issue":"1","license":[{"start":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T00:00:00Z","timestamp":1762819200000},"content-version":"vor","delay-in-days":314,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["2064\/1","390727645"],"award-info":[{"award-number":["2064\/1","390727645"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,1,17]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Augmented reality technology will likely be prevalent with more affordable head-mounted displays. Integrating novel interaction modalities, such as eye trackers into head-mounted displays could lead to collecting vast amounts of biometric data, which may allow inference of sensitive user attributes like health status or sexual preference, posing privacy issues. While previous works broadly examined privacy concerns about augmented reality, ours is the first to extensively explore privacy concerns on behavioral data, particularly eye tracking in augmented reality. We crowdsourced four survey studies in the USA (n1 = 48 and n2 = 525) and Germany (n3 = 48 and n4 = 525) to understand the impact of user attributes, augmented reality devices, use cases, data practices, and country on privacy concerns. Our findings indicate that participants are generally concerned about privacy when they know what inferences can be made based on the collected data. Despite the more prominent use of smartphones in daily life than augmented reality glasses, we found no indications of differing privacy concerns depending on the device type. In addition, our participants are more comfortable when a particular use case benefits them and less comfortable when other humans can consume their data. Furthermore, participants in the USA are less concerned about their privacy than those in Germany. Based on our findings, we provide several recommendations to practitioners and policymakers for privacy-aware augmented reality.<\/jats:p>","DOI":"10.1093\/cybsec\/tyaf036","type":"journal-article","created":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T14:50:00Z","timestamp":1762872600000},"source":"Crossref","is-referenced-by-count":0,"title":["The impact of device type, data practices, and use case scenarios on privacy concerns about eye-tracked augmented reality in the United States and Germany"],"prefix":"10.1093","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4594-4318","authenticated-orcid":false,"given":"Efe","family":"Bozkir","sequence":"first","affiliation":[{"name":"Technical University of Munich, School of Social Sciences and Technology , Department of Educational Sciences, Chair for Human-Centered Technologies for Learning, Arcisstrasse 21, 80333, Munich, Bayern ,","place":["Germany"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1679-4979","authenticated-orcid":false,"given":"Babette","family":"B\u00fchler","sequence":"additional","affiliation":[{"name":"Technical University of Munich, School of Social Sciences and Technology , Department of Educational Sciences, Chair for Human-Centered Technologies for Learning, Arcisstrasse 21, 80333, Munich, Bayern ,","place":["Germany"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2198-5067","authenticated-orcid":false,"given":"Xiaoyuan","family":"Wu","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, School of Computer Science , Software and Societal Systems Department, 4720 Forbes Avenue, Pittsburgh, PA 15213 ,","place":["United States"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3146-4484","authenticated-orcid":false,"given":"Enkelejda","family":"Kasneci","sequence":"additional","affiliation":[{"name":"Technical University of Munich, School of Social Sciences and Technology , Department of Educational Sciences, Chair for Human-Centered Technologies for Learning, Arcisstrasse 21, 80333, Munich, Bayern ,","place":["Germany"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8209-6792","authenticated-orcid":false,"given":"Lujo","family":"Bauer","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, School of Computer Science , Software and Societal Systems Department, 4720 Forbes Avenue, Pittsburgh, PA 15213 ,","place":["United States"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2125-0124","authenticated-orcid":false,"given":"Lorrie Faith","family":"Cranor","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, School of Computer Science , Software and Societal Systems Department, 4720 Forbes Avenue, Pittsburgh, PA 15213 ,","place":["United States"]}]}],"member":"286","published-online":{"date-parts":[[2025,11,11]]},"reference":[{"key":"2025111109495391600_bib1","article-title":"Head-mounted Display Market Outlook 2023 to 2033","author":"Future Market Insights, Inc.","year":"2023"},{"key":"2025111109495391600_bib2","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1002\/ase.1998","article-title":"The effectiveness of an augmented reality head-mounted display in learning skull anatomy at a community college","volume":"14","author":"Duncan-Vaidya","year":"2021","journal-title":"Anat Sci Educ"},{"key":"2025111109495391600_bib3","first-page":"683","article-title":"Detecting teacher expertise in an immersive VR classroom: leveraging fused sensor data with explainable machine learning models","volume-title":"Proceedings of the\u00a02023 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)","author":"Gao","year":"2023"},{"key":"2025111109495391600_bib4","doi-asserted-by":"publisher","DOI":"10.3171\/2021.5.FOCUS20735","article-title":"Augmented reality head-mounted display\u2013based incision planning in cranial neurosurgery: a prospective pilot study","volume":"51","author":"Ivan","year":"2021","journal-title":"Neurosurg Focus"},{"key":"2025111109495391600_bib5","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1007\/s00464-020-08246-4","article-title":"IMHOTEP: cross-professional evaluation of a three-dimensional virtual reality system for interactive surgical operation planning, tumor board discussion and immersive training for complex liver surgery in a head-mounted display","volume":"36","author":"Kenngott","year":"2022","journal-title":"Surg Endosc"},{"key":"2025111109495391600_bib6","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1016\/j.compmedimag.2017.04.006","article-title":"Application of eye tracking in medicine: a survey, research issues and challenges","volume":"65","author":"Harezlak","year":"2018","journal-title":"Comput Med Imaging Graph"},{"key":"2025111109495391600_bib7","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/s10649-020-09948-1","article-title":"Eye-tracking methodology in mathematics education research: a systematic literature review","volume":"104","author":"Strohmaier","year":"2020","journal-title":"Educ Stud Math"},{"key":"2025111109495391600_bib8","first-page":"10","article-title":"Eye tracking use in researching driver distraction: a scientometric and qualitative literature review approach","volume":"12","author":"Ojster\u0161ek","year":"2019","journal-title":"J Eye Movement Res"},{"key":"2025111109495391600_bib9","first-page":"4101","article-title":"Investigating the usability of collaborative robot control through hands-free operation using eye gaze and augmented reality","volume-title":"Proceedings of the\u00a02023 IEEE\/RSJ International Conference on Intelligent Robots and Systems (IROS)","author":"Lee","year":"2023"},{"key":"2025111109495391600_bib10","first-page":"1","article-title":"Foveated AR: dynamically-foveated augmented reality display","volume":"38","author":"Kim","year":"2019","journal-title":"ACM T Graphic"},{"key":"2025111109495391600_bib11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cag.2021.01.001","article-title":"ARtention: a design space for gaze-adaptive user interfaces in augmented reality","volume":"95","author":"Pfeuffer","year":"2021","journal-title":"Comput Graphic"},{"key":"2025111109495391600_bib12","article-title":"Introducing Apple Vision Pro","author":"Apple Inc.","year":"2023"},{"key":"2025111109495391600_bib13","article-title":"HoloLens 2 Technical Specifications","author":"Microsoft","year":"2023"},{"key":"2025111109495391600_bib14","article-title":"Eye tracking on Meta Quest Pro","author":"Meta","year":"2023"},{"key":"2025111109495391600_bib15","article-title":"Eye tracking","author":"Varjo Developer","year":"2023"},{"key":"2025111109495391600_bib16","first-page":"73","article-title":"Autism, eye-tracking, entropy","volume-title":"Proceedings of the 2008 7th IEEE International Conference on Development and Learning","author":"Shic","year":"2008"},{"key":"2025111109495391600_bib17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0255979","article-title":"Differential privacy for eye tracking with temporal correlations","volume":"16","author":"Bozkir","year":"2021","journal-title":"PLoS One"},{"key":"2025111109495391600_bib18","doi-asserted-by":"crossref","first-page":"27:1","DOI":"10.1145\/3314111.3319915","article-title":"Privacy-aware eye tracking using differential privacy","volume-title":"Proceedings of the 11th ACM Symposium on Eye Tracking Research and Applications","author":"Steil","year":"2019"},{"key":"2025111109495391600_bib19","doi-asserted-by":"publisher","first-page":"1008","DOI":"10.1080\/00224499.2015.1107524","article-title":"Video-based eye tracking in sex research: a systematic literature review","volume":"53","author":"Wenzlaff","year":"2016","journal-title":"J Sex Res"},{"key":"2025111109495391600_bib20","doi-asserted-by":"crossref","first-page":"1169","DOI":"10.1145\/2638728.2641688","article-title":"Privacy considerations for a pervasive eye tracking world","volume-title":"Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication","author":"Liebling","year":"2014"},{"key":"2025111109495391600_bib21","doi-asserted-by":"crossref","first-page":"11:1","DOI":"10.1145\/3314111.3319919","article-title":"Eye tracking support for visual analytics systems: foundations, current applications, and research challenges","volume-title":"Proceedings of the 11th ACM Symposium on Eye Tracking Research and Applications","author":"Silva","year":"2019"},{"key":"2025111109495391600_bib22","first-page":"226","volume-title":"What Does Your Gaze Reveal About You? On the Privacy Implications of Eye Tracking","author":"Kr\u00f6ger","year":"2020"},{"key":"2025111109495391600_bib23","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2305.14080","article-title":"Eye-tracked virtual reality: a comprehensive survey on methods and privacy challenges","author":"Bozkir","year":"2023"},{"key":"2025111109495391600_bib24","doi-asserted-by":"publisher","first-page":"2555","DOI":"10.1109\/TVCG.2021.3067787","article-title":"A privacy-preserving approach to streaming eye-tracking data","volume":"27","author":"David-John","year":"2021","journal-title":"IEEE T Vis Comput Gr"},{"key":"2025111109495391600_bib25","doi-asserted-by":"crossref","DOI":"10.1145\/3379156.3391364","article-title":"Privacy preserving gaze estimation using synthetic images via a randomized encoding based framework","volume-title":"Proceedings of the\u00a0ACM Symposium on Eye Tracking Research and Applications","author":"Bozkir","year":"2020"},{"key":"2025111109495391600_bib26","first-page":"1793","article-title":"Kaleido: real-time privacy control for eye-tracking systems","volume-title":"Proceedings of the\u00a030th USENIX Security Symposium (USENIX Security 21)","author":"Li","year":"2021"},{"key":"2025111109495391600_bib27","doi-asserted-by":"publisher","DOI":"10.1145\/3655605","article-title":"Privacy-preserving Scanpath comparison for pervasive eye tracking","volume":"8","author":"Ozdel","year":"2024","journal-title":"Proc ACM Hum Comput Interact"},{"key":"2025111109495391600_bib28","first-page":"145","article-title":"Semi-dense visual odometry for AR on a smartphone","volume-title":"Proceedings of the\u00a02014 IEEE International Symposium on Mixed and Augmented Reality (ISMAR)","author":"Sch\u00f6ps","year":"2014"},{"key":"2025111109495391600_bib29","first-page":"21:1","article-title":"Exploring the Opportunity of Augmented Reality (AR) in supporting older adults to explore and learn smartphone applications","volume-title":"Proceedings of the CHI Conference on Human Factors in Computing Systems","author":"Jin","year":"2024"},{"key":"2025111109495391600_bib30","doi-asserted-by":"publisher","DOI":"10.1145\/3272127.3275041","article-title":"Depth from motion for smartphone AR","volume":"37","author":"Valentin","year":"2018","journal-title":"ACM T Graphic"},{"key":"2025111109495391600_bib31","article-title":"Apple announces new accessibility features, including Eye tracking, music haptics, and vocal shortcuts","author":"Apple Newsroom","year":"2024"},{"key":"2025111109495391600_bib32","first-page":"1","article-title":"Information disclosure concerns in the age of wearable computing","volume-title":"Proceedings of the\u00a0NDSS Workshop on Usable Security (USEC)","author":"Lee","year":"2016"},{"key":"2025111109495391600_bib33","first-page":"513","article-title":"Evaluating and redefining smartphone permissions with contextualized justifications for mobile augmented reality apps","volume-title":"Proceedings of the\u00a0Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021)","author":"Harborth","year":"2021"},{"key":"2025111109495391600_bib34","doi-asserted-by":"crossref","first-page":"36:1","DOI":"10.1145\/3538969.3539011","article-title":"SoK: a systematic literature review of knowledge-based authentication on augmented reality head-mounted displays","volume-title":"Proceedings of the 17th International Conference on Availability, Reliability and Security","author":"D\u00fczg\u00fcn","year":"2022"},{"key":"2025111109495391600_bib35","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3313831.3376840","article-title":"The role of eye gaze in security and privacy applications: survey and future HCI research directions","volume-title":"Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems","author":"Katsini","year":"2020"},{"key":"2025111109495391600_bib36","doi-asserted-by":"crossref","first-page":"110:1","DOI":"10.1145\/3290605.3300340","article-title":"Behavioural biometrics in VR: identifying people from body motion and relations in virtual reality","volume-title":"Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems","author":"Pfeuffer","year":"2019"},{"key":"2025111109495391600_bib37","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1080\/00224499.2010.521899","article-title":"Differential gaze behavior towards sexually preferred and non-preferred human figures","volume":"48","author":"Hall","year":"2011","journal-title":"J Sex Res"},{"key":"2025111109495391600_bib38","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1016\/j.appet.2011.01.029","article-title":"Body mass index moderates gaze orienting biases and pupil diameter to high and low calorie food images","volume":"56","author":"Graham","year":"2011","journal-title":"Appetite"},{"key":"2025111109495391600_bib39","doi-asserted-by":"publisher","first-page":"578","DOI":"10.1016\/j.jand.2013.09.030","article-title":"Attention to food and beverage advertisements as measured by eye-tracking technology and the food preferences and choices of youth","volume":"114","author":"Velazquez","year":"2014","journal-title":"J Acad Nutr Diet"},{"key":"2025111109495391600_bib40","doi-asserted-by":"publisher","first-page":"103085","DOI":"10.1016\/j.ijhcs.2023.103085","article-title":"Evaluating user interface of a mobile augmented reality coloring application for children with autism: an eye-tracking investigation","volume":"178","author":"Lian","year":"2023","journal-title":"Int J Hum Comput Stud"},{"key":"2025111109495391600_bib41","doi-asserted-by":"publisher","first-page":"617","DOI":"10.1016\/j.biopsych.2010.05.035","article-title":"Eye-movement behavior reveals relational memory impairment in Schizophrenia","volume":"68","author":"Williams","year":"2010","journal-title":"Biol Psychiatry"},{"key":"2025111109495391600_bib42","doi-asserted-by":"crossref","first-page":"4:1","DOI":"10.1145\/3204493.3204531","article-title":"Cross-subject workload classification using pupil-related measures","volume-title":"Proceedings of the 2018 ACM Symposium on Eye Tracking Research and Applications","author":"Appel","year":"2018"},{"key":"2025111109495391600_bib43","doi-asserted-by":"crossref","first-page":"436:1","DOI":"10.1145\/3173574.3174010","article-title":"Your eyes tell: leveraging smooth pursuit for assessing cognitive workload","volume-title":"Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems","author":"Kosch","year":"2018"},{"key":"2025111109495391600_bib44","doi-asserted-by":"publisher","first-page":"1481","DOI":"10.1007\/s10055-022-00738-z","article-title":"Eye tracking in virtual reality: a broad review of applications and challenges","volume":"27","author":"Adhanom","year":"2023","journal-title":"Virtual Real"},{"key":"2025111109495391600_bib45","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1109\/MPRV.2022.3228660","article-title":"Privacy-aware eye tracking: challenges and future directions","volume":"22","author":"Gressel","year":"2023","journal-title":"IEEE Pervas Comput"},{"key":"2025111109495391600_bib46","article-title":"New infographic highlights XR technology data flows and privacy risks","author":"Future of Privacy Forum","year":"2022"},{"key":"2025111109495391600_bib47","doi-asserted-by":"crossref","first-page":"28:1","DOI":"10.1145\/3314111.3319823","article-title":"Differential privacy for eye-tracking data","volume-title":"Proceedings of the 11th ACM Symposium on Eye Tracking Research and Applications","author":"Liu","year":"2019"},{"key":"2025111109495391600_bib48","doi-asserted-by":"crossref","first-page":"595","DOI":"10.1007\/978-3-030-86380-7_48","article-title":"Reinforcement learning for the privacy preservation and manipulation of eye tracking data","volume-title":"Proceedings of the Artificial Neural Networks and Machine Learning\u2013ICANN 2021","author":"Fuhl","year":"2021"},{"key":"2025111109495391600_bib49","doi-asserted-by":"crossref","first-page":"26:1","DOI":"10.1145\/3314111.3319913","article-title":"PrivacEye: privacy-preserving head-mounted eye tracking using egocentric scene image and eye movement features","volume-title":"Proceedings of the 11th ACM Symposium on Eye Tracking Research and Applications","author":"Steil","year":"2019"},{"key":"2025111109495391600_bib50","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1145\/2632048.2632079","article-title":"Privacy behaviors of lifeloggers using wearable cameras","volume-title":"Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing","author":"Hoyle","year":"2014"},{"key":"2025111109495391600_bib51","doi-asserted-by":"crossref","first-page":"1645","DOI":"10.1145\/2702123.2702183","article-title":"Sensitive lifelogs: a privacy analysis of photos from wearable cameras","volume-title":"Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems","author":"Hoyle","year":"2015"},{"key":"2025111109495391600_bib52","doi-asserted-by":"publisher","DOI":"10.1145\/3090087","article-title":"Logging you, logging me: a replicable study of privacy and sharing behaviour in groups of visual lifeloggers","volume":"1","author":"Price","year":"2017","journal-title":"Proc ACM Interact Mob Wearable Ubiquit Technol"},{"key":"2025111109495391600_bib53","first-page":"399","article-title":"Privacy expectations and preferences in an IoT World","volume-title":"Proceedings of the\u00a0Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017)","author":"Naeini","year":"2017"},{"key":"2025111109495391600_bib54","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1109\/SP40001.2021.00112","article-title":"Which privacy and security attributes most impact consumers\u2019 risk perception and willingness to purchase iot devices?","volume-title":"Proceedings of the\u00a02021 IEEE Symposium on Security and Privacy (SP)","author":"Emami-Naeini","year":"2021"},{"key":"2025111109495391600_bib55","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1145\/3025453.3025749","article-title":"All about acceptability? Identifying factors for the adoption of data glasses","volume-title":"Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems","author":"Koelle","year":"2017"},{"key":"2025111109495391600_bib56","first-page":"295:1","article-title":"Consent in the age of ar: investigating the comfort with displaying personal information in augmented reality","volume-title":"Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems","author":"Rixen","year":"2022"},{"key":"2025111109495391600_bib57","doi-asserted-by":"publisher","first-page":"416","DOI":"10.56553\/popets-2023-0117","article-title":"Speculative privacy concerns about AR glasses data collection","volume":"4","author":"Gallardo","year":"2023","journal-title":"Proc Priv Enhanc Technol"},{"key":"2025111109495391600_bib58","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1007\/978-3-030-68086-2_8","article-title":"Too real for comfort: measuring consumers\u2019 augmented reality information privacy concerns","volume-title":"Augmented Reality and Virtual Reality","author":"Lammerding","year":"2021"},{"key":"2025111109495391600_bib59","doi-asserted-by":"crossref","first-page":"2377","DOI":"10.1145\/2556288.2557352","article-title":"In situ with bystanders of augmented reality glasses: perspectives on recording and privacy-mediating technologies","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems","author":"Denning","year":"2014"},{"key":"2025111109495391600_bib60","doi-asserted-by":"crossref","first-page":"392","DOI":"10.1109\/SP.2018.00051","article-title":"Towards security and privacy for multi-user augmented reality: foundations with end users","volume-title":"Proceedings of the\u00a02018 IEEE Symposium on Security and Privacy (SP)","author":"Lebeck","year":"2018"},{"key":"2025111109495391600_bib61","first-page":"177:1","article-title":"Privacy-enhancing technology and everyday augmented reality: understanding bystanders\u2019 varying needs for awareness and consent","volume":"6","author":"O\u2019Hagan","year":"2023","journal-title":"Proc ACM Interac Mob Wear Ubiquit Technol"},{"key":"2025111109495391600_bib62","doi-asserted-by":"crossref","first-page":"362","DOI":"10.1145\/2785830.2785842","article-title":"Don\u2019t Look at Me That Way! Understanding user attitudes towards data glasses usage","volume-title":"Proceedings of the 17th International Conference on Human-Computer Interaction with Mobile Devices and Services","author":"Koelle","year":"2015"},{"key":"2025111109495391600_bib63","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1145\/2381934.2381943","article-title":"I\u2019ve Got 99 Problems, but vibration Ain\u2019t One: a survey of smartphone users\u2019 concerns","volume-title":"Proceedings of the Second ACM Workshop on Security and Privacy in Smartphones and Mobile Devices","author":"Felt","year":"2012"},{"key":"2025111109495391600_bib64","doi-asserted-by":"publisher","first-page":"106833","DOI":"10.1016\/j.chb.2021.106833","article-title":"Investigating privacy concerns related to mobile augmented reality apps\u2013a vignette based online experiment","volume":"122","author":"Harborth","year":"2021","journal-title":"Comput Hum Behav"},{"key":"2025111109495391600_bib65","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3591133","article-title":"Investigating privacy perceptions and subjective acceptance of eye tracking on handheld mobile devices","volume":"7","author":"Alsakar","year":"2023","journal-title":"Proc ACM Hum Comput Interact"},{"key":"2025111109495391600_bib66","doi-asserted-by":"publisher","first-page":"1436","DOI":"10.1080\/10447318.2021.1888487","article-title":"Video cameras for lifelogging at home: preferred visualization modes, acceptance, and privacy perceptions among German and Turkish participants","volume":"37","author":"Wiktoria\u00a0Wilkowska","year":"2021","journal-title":"Int J Hum Comput Interact"},{"key":"2025111109495391600_bib67","doi-asserted-by":"crossref","first-page":"4823","DOI":"10.1145\/2858036.2858273","article-title":"Keep on Lockin\u2019 in the free world: a multi-national comparison of smartphone locking","volume-title":"Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems","author":"Harbach","year":"2016"},{"key":"2025111109495391600_bib68","doi-asserted-by":"publisher","first-page":"711","DOI":"10.1016\/j.ijinfomgt.2014.07.002","article-title":"What improves citizens\u2019 privacy perceptions toward RFID technology? A cross-country investigation using mixed method approach","volume":"34","author":"Hossain","year":"2014","journal-title":"Int J Inf Manage"},{"key":"2025111109495391600_bib69","first-page":"784:1","article-title":"Privacy in immersive extended reality: exploring user perceptions, concerns, and coping strategies","volume-title":"Proceedings of the CHI Conference on Human Factors in Computing Systems","author":"Hadan","year":"2024"},{"key":"2025111109495391600_bib70","doi-asserted-by":"publisher","first-page":"1462","DOI":"10.1109\/TITS.2013.2262098","article-title":"Visual analysis of eye state and head pose for driver alertness monitoring","volume":"14","author":"Oyini\u00a0Mbouna","year":"2013","journal-title":"IEEE T Intell Trans Syst"},{"key":"2025111109495391600_bib71","first-page":"1834","article-title":"Person independent, privacy preserving, and real time assessment of cognitive load using eye tracking in a virtual reality setup","volume-title":"Proceedings of the\u00a02019 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)","author":"Bozkir","year":"2019"},{"key":"2025111109495391600_bib72","doi-asserted-by":"publisher","first-page":"660","DOI":"10.1111\/tgis.12067","article-title":"Where Am I? Investigating map matching during self-localization with mobile eye tracking in an urban environment","volume":"18","author":"Kiefer","year":"2014","journal-title":"Trans GIS"},{"key":"2025111109495391600_bib73","doi-asserted-by":"publisher","first-page":"3151","DOI":"10.1109\/TIFS.2022.3201369","article-title":"Eye Know You Too: toward viable end-to-end eye movement biometrics for user authentication","volume":"17","author":"Lohr","year":"2022","journal-title":"IEEE T Inf Forensics Secur"},{"key":"2025111109495391600_bib74","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/MCE.2016.2590178","article-title":"A survey of affective computing for stress detection: evaluating technologies in stress detection for better health","volume":"5","author":"Greene","year":"2016","journal-title":"IEEE Consum Electron Mag"},{"key":"2025111109495391600_bib75","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1002\/aur.2093","article-title":"The use of eye tracking as a biomarker of treatment outcome in a pilot randomized clinical trial for young children with autism","volume":"12","author":"Bradshaw","year":"2019","journal-title":"Autism Res"},{"key":"2025111109495391600_bib76","doi-asserted-by":"publisher","first-page":"128383","DOI":"10.1109\/ACCESS.2023.3332762","article-title":"PredictEYE: personalized time series model for mental state prediction using eye tracking","volume":"11","author":"Jyotsna","year":"2023","journal-title":"IEEE Access"},{"key":"2025111109495391600_bib77","doi-asserted-by":"publisher","first-page":"477","DOI":"10.2307\/40041279","article-title":"A taxonomy of privacy","volume":"154","author":"Solove","year":"2006","journal-title":"Univ Pennsyl Law Rev"},{"key":"2025111109495391600_bib78","first-page":"119","article-title":"Privacy as contextual integrity","volume":"79","author":"Nissenbaum","year":"2004","journal-title":"Wash Law Rev"},{"key":"2025111109495391600_bib79","article-title":"Market insights, advertising and media, AR and VR - Worldwide","author":"Statista","year":"2024"},{"key":"2025111109495391600_bib80","article-title":"Eye tracking market scope, share to 2030","author":"Straits Research","year":"2022"},{"key":"2025111109495391600_bib81","doi-asserted-by":"publisher","first-page":"1151","DOI":"10.2307\/4135723","article-title":"The two western cultures of privacy: Dignity versus liberty","volume":"113","author":"Whitman","year":"2003","journal-title":"Yale Law J"},{"key":"2025111109495391600_bib82","first-page":"771","article-title":"Global data privacy: the EU way","volume":"94","author":"Schwartz","year":"2019","journal-title":"N Y Univ Law Rev"},{"key":"2025111109495391600_bib83","doi-asserted-by":"publisher","first-page":"1643","DOI":"10.3758\/s13428-021-01694-3","article-title":"Data quality of platforms and panels for online behavioral research","volume":"54","author":"Peer","year":"2022","journal-title":"Behav Res Methods"},{"key":"2025111109495391600_bib84","doi-asserted-by":"publisher","first-page":"1171","DOI":"10.2307\/2532457","article-title":"Assessing proportionality in the proportional odds model for ordinal logistic regression","volume":"46","author":"Brant","year":"1990","journal-title":"Biometrics"},{"key":"2025111109495391600_bib85","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1287\/orsc.10.1.104","article-title":"Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation","volume":"10","author":"Culnan","year":"1999","journal-title":"Organ Sci"},{"key":"2025111109495391600_bib86","doi-asserted-by":"crossref","first-page":"2551","DOI":"10.1145\/2556288.2557092","article-title":"Exploring the acceptability of google glass as an everyday assistive device for people with parkinson\u2019s","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems","author":"McNaney","year":"2014"},{"key":"2025111109495391600_bib87","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2501604.2501611","article-title":"What matters to users? Factors that affect users\u2019 willingness to share information with online advertisers","volume-title":"Proceedings of Symposium on Usable Privacy and Security (SOUPS)","author":"Leon","year":"2013"},{"key":"2025111109495391600_bib88","doi-asserted-by":"crossref","first-page":"13732","DOI":"10.1038\/s41598-025-98891-3","article-title":"Cognitive load classification of mixed reality human computer interaction tasks based on multimodal sensor signals","volume":"15","author":"Hou","year":"2025","journal-title":"Sci Rep"},{"key":"2025111109495391600_bib89","doi-asserted-by":"crossref","DOI":"10.1145\/3649902.3653340","article-title":"Gaze-guided graph neural network for action anticipation conditioned on intention","volume-title":"Proceedings of the 2024 Symposium on Eye Tracking Research and Applications","author":"\u00d6zdel","year":"2024"},{"key":"2025111109495391600_bib90","first-page":"1","article-title":"Using deep learning for fusion of eye and mouse movement based user authentication","volume-title":"Proceedings of the\u00a02020 IEEE International Joint Conference on Biometrics (IJCB)","author":"Liu","year":"2020"},{"key":"2025111109495391600_bib91","doi-asserted-by":"publisher","first-page":"2257","DOI":"10.1109\/TVCG.2024.3372032","article-title":"Privacy-preserving gaze data streaming in immersive interactive virtual reality: robustness and user experience","volume":"30","author":"Wilson","year":"2024","journal-title":"IEEE T Vis Comput Gr"},{"key":"2025111109495391600_bib92","article-title":"Equipped for the Future? Young people on their preparedness for a life in the digital age","author":"VG Foundation","year":"2023"},{"key":"2025111109495391600_bib93","first-page":"1","article-title":"Research and innovation policy in the US and Germany: a comparison","author":"Hommes","year":"2011"},{"key":"2025111109495391600_bib94","first-page":"1","article-title":"Regulation (EU) 2016\/679 of the European Parliament and of the Council\u00a0of the European Union","volume":"119","author":"European Parliament","year":"2016","journal-title":"OJ L"},{"key":"2025111109495391600_bib95","article-title":"The Health Insurance Portability and Accountability Act of 1996 (HIPAA)","author":"Centers for Medicare and Medicaid Services","year":"1996"},{"key":"2025111109495391600_bib96","article-title":"California Consumer Privacy Act (CCPA)","author":"State of California Department of Justice","year":"2023"},{"key":"2025111109495391600_bib97","doi-asserted-by":"publisher","DOI":"10.1177\/20539517241270663","article-title":"Privacy resignation, apathy, and cynicism: introduction to a special theme","volume":"11","author":"Draper","year":"2024","journal-title":"Big Data Soc"},{"key":"2025111109495391600_bib98","doi-asserted-by":"publisher","first-page":"1824","DOI":"10.1177\/1461444819833331","article-title":"The corporate cultivation of digital resignation","volume":"21","author":"Draper","year":"2019","journal-title":"New Media Soc"},{"key":"2025111109495391600_bib99","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s44206-023-00081-z","article-title":"Eye-tracking devices for virtual and augmented reality metaverse environments and their compatibility with the European Union general data protection regulation","volume":"3","author":"Men\u00e9ndez\u00a0Gonz\u00e1lez","year":"2024","journal-title":"Digit Soc"},{"key":"2025111109495391600_bib100","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/3-540-45427-6_23","article-title":"Privacy by design\u2014principles of privacy-aware ubiquitous systems","volume-title":"Proceedings of the Ubicomp 2001: Ubiquitous Computing","author":"Langheinrich","year":"2001"},{"key":"2025111109495391600_bib101","first-page":"772:1","article-title":"What you experience is what we collect: user experience based fine-grained permissions for everyday augmented reality","volume-title":"Proceedings of the CHI Conference on Human Factors in Computing Systems","author":"Abraham","year":"2024"},{"key":"2025111109495391600_bib102","first-page":"1273","article-title":"Communication-efficient learning of deep networks from decentralized data","volume-title":"Proceedings of the\u00a0International Conference on Artificial Intelligence and Statistics (AISTATS)","author":"McMahan","year":"2017"},{"key":"2025111109495391600_bib103","article-title":"Shop with a specialist","author":"A Inc.","year":"2025"},{"key":"2025111109495391600_bib104","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1109\/MSEC.2021.3132398","article-title":"An informative security and privacy \u201cnutrition\u201d label for internet of things devices","volume":"20","author":"Emami-Naeini","year":"2022","journal-title":"IEEE Secur Priv"},{"key":"2025111109495391600_bib105","doi-asserted-by":"crossref","DOI":"10.1145\/3491102.3502012","article-title":"Understanding challenges for developers to create accurate privacy nutrition labels","volume-title":"Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems","author":"Li","year":"2022"},{"key":"2025111109495391600_bib106","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1109\/MCG.2021.3113455","article-title":"DiVRsify: break the cycle and develop VR for everyone","volume":"41","author":"Peck","year":"2021","journal-title":"IEEE Comput Graphic Appl"},{"key":"2025111109495391600_bib107","doi-asserted-by":"publisher","first-page":"455","DOI":"10.56553\/popets-2023-0027","article-title":"Is there a reverse privacy paradox? An exploratory analysis of gaps between privacy perspectives and privacy-seeking behaviors","volume":"1","author":"Colnago","year":"2023","journal-title":"Proc Priv Enhanc Technol"},{"key":"2025111109495391600_bib108","first-page":"1","article-title":"The myth of the privacy Paradox","volume":"89","author":"Solove","year":"2021","journal-title":"George Washing Law Rev"}],"container-title":["Journal of Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/11\/1\/tyaf036\/65269504\/tyaf036.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/11\/1\/tyaf036\/65269504\/tyaf036.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,11]],"date-time":"2025-11-11T14:50:11Z","timestamp":1762872611000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article\/doi\/10.1093\/cybsec\/tyaf036\/8320549"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":108,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1,17]]}},"URL":"https:\/\/doi.org\/10.1093\/cybsec\/tyaf036","relation":{},"ISSN":["2057-2085","2057-2093"],"issn-type":[{"value":"2057-2085","type":"print"},{"value":"2057-2093","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2025]]},"published":{"date-parts":[[2025]]},"article-number":"tyaf036"}}