{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T20:58:08Z","timestamp":1776113888539,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,5,2]],"date-time":"2017-05-02T00:00:00Z","timestamp":1493683200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,5,2]]},"DOI":"10.1145\/3025453.3025632","type":"proceedings-article","created":{"date-parts":[[2017,5,3]],"date-time":"2017-05-03T12:34:28Z","timestamp":1493814868000},"page":"6765-6776","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":105,"title":["Spiders in the Sky"],"prefix":"10.1145","author":[{"given":"Victoria","family":"Chang","sequence":"first","affiliation":[{"name":"University of Maryland College Park, College Park, MD, USA"}]},{"given":"Pramod","family":"Chundury","sequence":"additional","affiliation":[{"name":"University of Maryland College Park, College Park, MD, USA"}]},{"given":"Marshini","family":"Chetty","sequence":"additional","affiliation":[{"name":"Princeton University, Princeton, NJ, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,5,2]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"54","article-title":"Unmanned aerial vehicles: an overview","volume":"3","author":"de Fatima Bento Maria","year":"2008","unstructured":"Maria de Fatima Bento . 2008 . Unmanned aerial vehicles: an overview . Inside GNSS 3 , 1 (2008), 54 -- 61 . Maria de Fatima Bento. 2008. Unmanned aerial vehicles: an overview. Inside GNSS 3, 1 (2008), 54--61.","journal-title":"Inside GNSS"},{"key":"e_1_3_2_1_2_1","volume-title":"You Wouldn't have Your Granny Using Them': Drawing Boundaries Between Acceptable and Unacceptable Applications of Civil Drones. Science and Engineering Ethics","author":"Boucher Philip","year":"2015","unstructured":"Philip Boucher . 2015. ' You Wouldn't have Your Granny Using Them': Drawing Boundaries Between Acceptable and Unacceptable Applications of Civil Drones. Science and Engineering Ethics ( 2015 ), 1--28. Philip Boucher. 2015. 'You Wouldn't have Your Granny Using Them': Drawing Boundaries Between Acceptable and Unacceptable Applications of Civil Drones. Science and Engineering Ethics (2015), 1--28."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.v58:2"},{"key":"e_1_3_2_1_4_1","volume-title":"Unmanned aerial vehicles: Examining the safety, security, privacy and regulatory issues of integration into US airspace","author":"Carr Eric Baldwin","year":"2013","unstructured":"Eric Baldwin Carr . 2013. Unmanned aerial vehicles: Examining the safety, security, privacy and regulatory issues of integration into US airspace . National Centre for Policy Analysis (NCPA) . Retrieved on September 23 ( 2013 ), 2014. Eric Baldwin Carr. 2013. Unmanned aerial vehicles: Examining the safety, security, privacy and regulatory issues of integration into US airspace. National Centre for Policy Analysis (NCPA). Retrieved on September 23 (2013), 2014."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2750858.2805823"},{"key":"e_1_3_2_1_6_1","volume-title":"Emotion Encoding in Human-Drone Interaction. In The Eleventh ACM\/IEEE International Conference on Human Robot Interaction (HRI '16)","author":"Cauchard Jessica Rebecca","unstructured":"Jessica Rebecca Cauchard , Kevin Y. Zhai , Marco Spadafora , and James A. Landay . 2016 . Emotion Encoding in Human-Drone Interaction. In The Eleventh ACM\/IEEE International Conference on Human Robot Interaction (HRI '16) . IEEE Press, Piscataway, NJ, USA, 263--270. http:\/\/dl.acm.org.proxy-um.researchport.umd.edu\/citation.cfm?id=2906831.2906878 Jessica Rebecca Cauchard, Kevin Y. Zhai, Marco Spadafora, and James A. Landay. 2016. Emotion Encoding in Human-Drone Interaction. In The Eleventh ACM\/IEEE International Conference on Human Robot Interaction (HRI '16). IEEE Press, Piscataway, NJ, USA, 263--270. http:\/\/dl.acm.org.proxy-um.researchport.umd.edu\/citation.cfm?id=2906831.2906878"},{"key":"e_1_3_2_1_7_1","volume-title":"Human-Computer Interface for Control of Unmanned Aerial Vehicles. In 2007 IEEE Systems and Information Engineering Design Symposium. 1--6.","author":"Cavett D.","unstructured":"D. Cavett , M. Coker , R. Jimenez , and B. Yaacoubi . 2007 . Human-Computer Interface for Control of Unmanned Aerial Vehicles. In 2007 IEEE Systems and Information Engineering Design Symposium. 1--6. D. Cavett, M. Coker, R. Jimenez, and B. Yaacoubi. 2007. Human-Computer Interface for Control of Unmanned Aerial Vehicles. In 2007 IEEE Systems and Information Engineering Design Symposium. 1--6."},{"key":"e_1_3_2_1_8_1","unstructured":"Ann Cavoukian. 2012. Privacy and drones: Unmanned aerial vehicles. Information and Privacy Commissioner of Ontario Ontario Canada.  Ann Cavoukian. 2012. Privacy and drones: Unmanned aerial vehicles. Information and Privacy Commissioner of Ontario Ontario Canada."},{"key":"e_1_3_2_1_9_1","unstructured":"Ethan Chiel. 2016. The Service That Promised to Keep Drones Away From Your Home Silently Shut Down. (2016). http:\/\/fusion.net\/story\/305654\/noflyzone-no-fly-zone-drone-shuts-down\/  Ethan Chiel. 2016. The Service That Promised to Keep Drones Away From Your Home Silently Shut Down. (2016). http:\/\/fusion.net\/story\/305654\/noflyzone-no-fly-zone-drone-shuts-down\/"},{"key":"e_1_3_2_1_10_1","volume-title":"Mehta","author":"Clothier Reece A.","year":"2015","unstructured":"Reece A. Clothier , Dominique A. Greer , Duncan G. Greer , and Amisha M . Mehta . 2015 . Risk perception and the public acceptance of drones. Risk analysis 35, 6 (2015), 1167--1183. Reece A. Clothier, Dominique A. Greer, Duncan G. Greer, and Amisha M. Mehta. 2015. Risk perception and the public acceptance of drones. Risk analysis 35, 6 (2015), 1167--1183."},{"key":"e_1_3_2_1_11_1","unstructured":"Adam Conner-Simons. 2016. Wireless tech means safer drones smarter homes and password-free WiFi. (2016). https:\/\/news.mit.edu\/2016\/wireless-tech-means-safer-drones-smarter-homes-password-free-wifi-0331  Adam Conner-Simons. 2016. Wireless tech means safer drones smarter homes and password-free WiFi. (2016). https:\/\/news.mit.edu\/2016\/wireless-tech-means-safer-drones-smarter-homes-password-free-wifi-0331"},{"key":"e_1_3_2_1_12_1","unstructured":"DJI Geo System. http:\/\/www.dji.com\/flysafe\/geo-system  DJI Geo System. http:\/\/www.dji.com\/flysafe\/geo-system"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702249"},{"key":"e_1_3_2_1_14_1","volume-title":"Retrieved","author":"FAA.","year":"2016","unstructured":"FAA. 2016 . FAA Aerospace Forecasts. (2016) . Retrieved September 13, 2016 from https:\/\/www.faa.gov\/data_research\/aviation\/aerospace_forecasts\/. FAA. 2016. FAA Aerospace Forecasts. (2016). Retrieved September 13, 2016 from https:\/\/www.faa.gov\/data_research\/aviation\/aerospace_forecasts\/."},{"key":"e_1_3_2_1_15_1","unstructured":"Federal Aviation Administration 2016a. B4UFLY Smartphone App. (2016). Retrieved September 13 2016 from https:\/\/www.faa.gov\/uas\/where_to_fly\/b4ufly\/.  Federal Aviation Administration 2016a. B4UFLY Smartphone App. (2016). Retrieved September 13 2016 from https:\/\/www.faa.gov\/uas\/where_to_fly\/b4ufly\/."},{"key":"e_1_3_2_1_16_1","unstructured":"Federal Aviation Administration 2016b. Unmanned Aircraft Systems. (2016). Retrieved September 13 2016 from https:\/\/www.faa.gov\/uas\/.  Federal Aviation Administration 2016b. Unmanned Aircraft Systems. (2016). Retrieved September 13 2016 from https:\/\/www.faa.gov\/uas\/."},{"key":"e_1_3_2_1_17_1","unstructured":"Dan Gettinger and Arthur Holland Michel. 2015. Drone sightings and close encounters: An analysis. (2015). Retrieved September 13 2016 from http:\/\/dronecenter.bard.edu\/files\/2015\/12\/12-11-Drone-Sightings-and-Close-Encounters.pdf.  Dan Gettinger and Arthur Holland Michel. 2015. Drone sightings and close encounters: An analysis. (2015). Retrieved September 13 2016 from http:\/\/dronecenter.bard.edu\/files\/2015\/12\/12-11-Drone-Sightings-and-Close-Encounters.pdf."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2212776.2212386"},{"key":"e_1_3_2_1_19_1","volume-title":"Retrieved","author":"Herron Kerry G","year":"2014","unstructured":"Kerry G Herron , Hank C Jenkins Smith , and Carol L Silva . 2014 . US Public Perspectives on Privacy, Security, and Unmanned Aircraft Systems. (2014) . Retrieved September 13, 2016 from http:\/\/crcm.ou.edu\/pvcy2014\/report.pdf. Kerry G Herron, Hank C Jenkins Smith, and Carol L Silva. 2014. US Public Perspectives on Privacy, Security, and Unmanned Aircraft Systems. (2014). Retrieved September 13, 2016 from http:\/\/crcm.ou.edu\/pvcy2014\/report.pdf."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2468356.2468721"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2857546.2857639"},{"key":"e_1_3_2_1_22_1","volume-title":"Droning on About Drones - Acceptance of and Perceived Barriers to Drones in Civil Usage Contexts","author":"Lidynia Chantal","unstructured":"Chantal Lidynia , Ralf Philipsen , and Martina Ziefie . 2017. Droning on About Drones - Acceptance of and Perceived Barriers to Drones in Civil Usage Contexts . Springer International Publishing , Cham , 317--329. Chantal Lidynia, Ralf Philipsen, and Martina Ziefie. 2017. Droning on About Drones - Acceptance of and Perceived Barriers to Drones in Civil Usage Contexts. Springer International Publishing, Cham, 317--329."},{"key":"e_1_3_2_1_23_1","volume-title":"Information and Communication Technology Research (ICTRC), 2015 International Conference on. 298--301","author":"Mashood A.","unstructured":"A. Mashood , H. Noura , I. Jawhar , and N. Mohamed . 2015. A gesture based kinect for quadrotor control . In Information and Communication Technology Research (ICTRC), 2015 International Conference on. 298--301 . A. Mashood, H. Noura, I. Jawhar, and N. Mohamed. 2015. A gesture based kinect for quadrotor control. In Information and Communication Technology Research (ICTRC), 2015 International Conference on. 298--301."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2929464.2932429"},{"key":"e_1_3_2_1_25_1","volume-title":"The Drones Are Coming! Will the Fourth Amendment Stop Their Threat to Our Privacy? Will the Fourth Amendment Stop Their Threat to Our Privacy","author":"Molko Robert","year":"2012","unstructured":"Robert Molko . 2012. The Drones Are Coming! Will the Fourth Amendment Stop Their Threat to Our Privacy? Will the Fourth Amendment Stop Their Threat to Our Privacy ( 2012 ). Robert Molko. 2012. The Drones Are Coming! Will the Fourth Amendment Stop Their Threat to Our Privacy? Will the Fourth Amendment Stop Their Threat to Our Privacy (2012)."},{"key":"e_1_3_2_1_26_1","unstructured":"A node.js client for controlling Parrot AR Drone 2.0 quad-copters. Retrieved from https:\/\/github.com\/felixge\/node-ar-drone.  A node.js client for controlling Parrot AR Drone 2.0 quad-copters. Retrieved from https:\/\/github.com\/felixge\/node-ar-drone."},{"key":"e_1_3_2_1_27_1","unstructured":"Parrot AR.Drone 2.0. https:\/\/www.parrot.com\/us\/drones\/parrot-ardrone-20-power-edition.  Parrot AR.Drone 2.0. https:\/\/www.parrot.com\/us\/drones\/parrot-ardrone-20-power-edition."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1394445.1394494"},{"key":"e_1_3_2_1_29_1","volume-title":"The. Pitt. J. Tech. L. & Pol'y 13","author":"Schlag Chris","year":"2012","unstructured":"Chris Schlag . 2012. New Privacy Battle: How the Expanding Use of Drones Continues to Erode Our Concept of Privacy and Privacy Rights , The. Pitt. J. Tech. L. & Pol'y 13 ( 2012 ), i. Chris Schlag. 2012. New Privacy Battle: How the Expanding Use of Drones Continues to Erode Our Concept of Privacy and Privacy Rights, The. Pitt. J. Tech. L. & Pol'y 13 (2012), i."},{"key":"e_1_3_2_1_30_1","unstructured":"Irving Seidman. 2013. Interviewing As Qualitative Research: A Guide for Researchers in Education and the Social Sciences. Teachers college press.  Irving Seidman. 2013. Interviewing As Qualitative Research: A Guide for Researchers in Education and the Social Sciences. Teachers college press."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2750858.2806064"},{"key":"e_1_3_2_1_32_1","volume-title":"Protecting Privacy from Aerial Surveillance: Recommendations for Government Use of Drone Aircraft: Report","author":"Stanley Jay","unstructured":"Jay Stanley and Catherine Crump . 2011. Protecting Privacy from Aerial Surveillance: Recommendations for Government Use of Drone Aircraft: Report . American Civil Liberties Union , Washington,D.C. ,USA. Jay Stanley and Catherine Crump. 2011. Protecting Privacy from Aerial Surveillance: Recommendations for Government Use of Drone Aircraft: Report. American Civil Liberties Union, Washington,D.C.,USA."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.4018\/IJASOT.2014070101"},{"key":"e_1_3_2_1_34_1","volume-title":"Proceedings of the 9th International Conference on Ubiquitous Computing (UbiComp '07)","author":"Sung Ja-Young","unstructured":"Ja-Young Sung , Lan Guo , Rebecca E. Grinter , and Henrik I. Christensen . 2007. \"My Roomba is Rambo\": Intimate Home Appliances . In Proceedings of the 9th International Conference on Ubiquitous Computing (UbiComp '07) . Springer-Verlag, Berlin, Heidelberg, 145--162. http:\/\/dl.acm.org\/citation.cfm?id=1771592.1771601 Ja-Young Sung, Lan Guo, Rebecca E. Grinter, and Henrik I. Christensen. 2007. \"My Roomba is Rambo\": Intimate Home Appliances. In Proceedings of the 9th International Conference on Ubiquitous Computing (UbiComp '07). Springer-Verlag, Berlin, Heidelberg, 145--162. http:\/\/dl.acm.org\/citation.cfm?id=1771592.1771601"},{"key":"e_1_3_2_1_35_1","volume-title":"Retrieved","author":"Teal Group Corporation","year":"2016","unstructured":"Teal Group Corporation 2016 . Teal Group Predicts Worldwide Civil UAS Production Will Total $65 Billion in Its 2016 UAS Market Profile and Forecast. (2016) . Retrieved September 15, 2016 from http:\/\/www.tealgroup.com\/index.php\/about-teal-group-corporation\/press-releases\/. Teal Group Corporation 2016. Teal Group Predicts Worldwide Civil UAS Production Will Total $65 Billion in Its 2016 UAS Market Profile and Forecast. (2016). Retrieved September 15, 2016 from http:\/\/www.tealgroup.com\/index.php\/about-teal-group-corporation\/press-releases\/."},{"key":"e_1_3_2_1_36_1","volume-title":"Congressional Research Service.","author":"Richard M","year":"2015","unstructured":"Richard M Thompson II. 2015 . Domestic Drones and Privacy: a primer. Vol. 43965 . Congressional Research Service. Richard M Thompson II. 2015. Domestic Drones and Privacy: a primer. Vol. 43965. Congressional Research Service."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJLSE.2013.060848"},{"key":"e_1_3_2_1_38_1","volume-title":"Unmanning the police manhunt: Vertical security as pacification. Socialist Studies\/\u00c9tudes Socialistes 9, 2","author":"Wall Tyler","year":"2013","unstructured":"Tyler Wall . 2013. Unmanning the police manhunt: Vertical security as pacification. Socialist Studies\/\u00c9tudes Socialistes 9, 2 ( 2013 ). Tyler Wall. 2013. Unmanning the police manhunt: Vertical security as pacification. Socialist Studies\/\u00c9tudes Socialistes 9, 2 (2013)."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0022"}],"event":{"name":"CHI '17: CHI Conference on Human Factors in Computing Systems","location":"Denver Colorado USA","acronym":"CHI '17","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3025453.3025632","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3025453.3025632","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:03:34Z","timestamp":1750215814000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3025453.3025632"}},"subtitle":["User Perceptions of Drones, Privacy, and Security"],"short-title":[],"issued":{"date-parts":[[2017,5,2]]},"references-count":39,"alternative-id":["10.1145\/3025453.3025632","10.1145\/3025453"],"URL":"https:\/\/doi.org\/10.1145\/3025453.3025632","relation":{},"subject":[],"published":{"date-parts":[[2017,5,2]]},"assertion":[{"value":"2017-05-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}