{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T17:01:37Z","timestamp":1772557297792,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":68,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,26]],"date-time":"2020-10-26T00:00:00Z","timestamp":1603670400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,26]]},"DOI":"10.1145\/3373625.3417014","type":"proceedings-article","created":{"date-parts":[[2020,10,30]],"date-time":"2020-10-30T00:58:07Z","timestamp":1604019487000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Visual Content Considered Private by People Who are Blind"],"prefix":"10.1145","author":[{"given":"Abigale","family":"Stangl","sequence":"first","affiliation":[{"name":"School of Information University of Texas, USA"}]},{"given":"Kristina","family":"Shiroma","sequence":"additional","affiliation":[{"name":"School of Information University of Texas, United States"}]},{"given":"Bo","family":"Xie","sequence":"additional","affiliation":[{"name":"School of Information University of Texas at Austin, United States"}]},{"given":"Kenneth R.","family":"Fleischmann","sequence":"additional","affiliation":[{"name":"School of Information The University of Texas at Austin, United States"}]},{"given":"Danna","family":"Gurari","sequence":"additional","affiliation":[{"name":"School of Information University of Texas at Austin, United States"}]}],"member":"320","published-online":{"date-parts":[[2020,10,29]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3234695.3236344"},{"key":"e_1_3_2_2_2_1","unstructured":"AbleData. 2020. Color Teller Talking Color Identifier. https:\/\/abledata.acl.gov\/product\/color-teller-talking-color-identifier. (Accessed on 01\/08\/2020)."},{"key":"e_1_3_2_2_3_1","volume-title":"A blind-friendly photography application for smartphones. ACM SIGACCESS Accessibility and Computing108","author":"Adams Dustin","year":"2014","unstructured":"Dustin Adams and Sri Kurniawan. 2014. A blind-friendly photography application for smartphones. ACM SIGACCESS Accessibility and Computing108 (2014), 12\u201315."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240683"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702334"},{"key":"e_1_3_2_2_7_1","volume-title":"Twelfth Symposium on Usable Privacy and Security ({SOUPS}","author":"Ahmed Tousif","year":"2016","unstructured":"Tousif Ahmed, Patrick Shaffer, Kay Connelly, David Crandall, and Apu Kapadia. 2016. Addressing physical safety, security, and privacy for people with visual impairments. In Twelfth Symposium on Usable Privacy and Security ({SOUPS} 2016). 341\u2013354."},{"key":"e_1_3_2_2_8_1","unstructured":"Seeing AI. 2020. Talking camera app for those with a visual impairment. https:\/\/www.microsoft.com\/en-us\/ai\/seeing-ai. (Accessed on 01\/08\/2020)."},{"key":"e_1_3_2_2_9_1","unstructured":"AIpoly. 2020. AIpoly Homepage. https:\/\/www.aipoly.com\/. (Accessed on 01\/08\/2020)."},{"key":"e_1_3_2_2_10_1","unstructured":"Aira. 2020. Aira Homepage. https:\/\/aira.io\/. (Accessed on 01\/08\/2020)."},{"key":"e_1_3_2_2_11_1","volume-title":"Privacy Concerns of the Visually Impaired with Camera Based Assistive Applications. In 29th USENIX Security Symposium (USENIX Security 20)","author":"Akter Taslima","year":"2020","unstructured":"Taslima Akter, Bryan Dosono, Tousif Ahmed, Apu Kapadia, and Bryan Semaan. 2020. \u201dI am uncomfortable sharing what I can\u2019t see\u201d: Privacy Concerns of the Visually Impaired with Camera Based Assistive Applications. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, Boston, MA. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/akter"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979424"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2384916.2384945"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173650"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"crossref","unstructured":"Andrew Besmer and Heather Lipford. 2009. Tagged photos: concerns perceptions and protections. In CHI\u201909 Extended Abstracts on Human Factors in Computing Systems. ACM 4585\u20134590.","DOI":"10.1145\/1520340.1520704"},{"key":"e_1_3_2_2_16_1","unstructured":"BeSpecular. 2020. BeSpecular. https:\/\/www.bespecular.com\/. (Accessed on 01\/08\/2020)."},{"key":"e_1_3_2_2_17_1","volume-title":"Contextual design: defining customer-centered systems","author":"Beyer Hugh","year":"1998","unstructured":"Hugh Beyer and Karen Holtzblatt. 1998. Contextual design: defining customer-centered systems. 1998. San Francisco: Morgan Kauffman(1998)."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866029.1866080"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2049536.2049540"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702329"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2481291"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132525.3132534"},{"key":"e_1_3_2_2_23_1","volume-title":"Using thematic analysis in psychology. Qualitative research in psychology 3, 2","author":"Braun Virginia","year":"2006","unstructured":"Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative research in psychology 3, 2 (2006), 77\u2013101."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3234695.3236342"},{"key":"e_1_3_2_2_25_1","unstructured":"Shonal Chaudhry and Rohitash Chandra. 2015. Design of a mobile face recognition system for visually impaired persons. arXiv preprint arXiv:1502.00756(2015)."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR42600.2020.00370"},{"key":"e_1_3_2_2_27_1","volume-title":"Contextual Inquiry of People with Visual Impairments in Authentication. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015","author":"Dosono Bryan","year":"2015","unstructured":"Bryan Dosono, Jordan Hayes, and Yang Wang. 2015. \u201cI\u2019m Stuck!\u201d: A Contextual Inquiry of People with Visual Impairments in Authentication. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015). USENIX Association, Ottawa, 151\u2013168. https:\/\/www.usenix.org\/conference\/soups2015\/proceedings\/presentation\/dosono"},{"key":"e_1_3_2_2_28_1","unstructured":"Be\u00a0My Eyes. 2020. Bringing sight to blind and low-vision people. https:\/\/www.bemyeyes.com\/. (Accessed on 01\/08\/2020)."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-02332-3"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557072"},{"key":"e_1_3_2_2_31_1","volume-title":"Value sensitive design and information systems. The handbook of information and computer ethics","author":"Friedman Batya","year":"2008","unstructured":"Batya Friedman, Peter\u00a0H Kahn, and Alan Borning. 2008. Value sensitive design and information systems. The handbook of information and computer ethics (2008), 69\u2013101."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2009.5459413"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025781"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00103"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00380"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"crossref","unstructured":"Danna Gurari Yinan Zhao Meng Zhang and Nilavra Bhattacharya. 2020. Captioning Images Taken by People Who Are Blind. arXiv preprint arXiv:2002.08565(2020).","DOI":"10.1007\/978-3-030-58520-4_25"},{"key":"e_1_3_2_2_37_1","unstructured":"Gene\u00a0E Hall 1977. Measuring Stages of Concern about the Innovation: A Manual for the Use of the SoC Questionnaire.(1977)."},{"key":"e_1_3_2_2_38_1","volume-title":"Fifteenth Symposium on Usable Privacy and Security ({SOUPS}","author":"Hayes Jordan","year":"2019","unstructured":"Jordan Hayes, Smirity Kaushik, Charlotte\u00a0Emily Price, and Yang Wang. 2019. Cooperative privacy and security: Learning from people with visual impairments and their allies. In Fifteenth Symposium on Usable Privacy and Security ({SOUPS} 2019)."},{"key":"e_1_3_2_2_39_1","unstructured":"iDentifi. 2020. iDentifi. http:\/\/getidentifi.com\/. (Accessed on 01\/08\/2020)."},{"key":"e_1_3_2_2_40_1","unstructured":"AI\u00a0Now Institute. 2019. Disability Bias and AI. https:\/\/ainowinstitute.org\/disabilitybiasai-2019.pdf. (Accessed on 01\/02\/2020)."},{"key":"e_1_3_2_2_41_1","volume-title":"Proceedings of the International Conference on Information and Knowledge Engineering (IKE). The Steering Committee of The World Congress in Computer Science, Computer\u00a0\u2026, 1.","author":"Jafri Rabia","year":"2013","unstructured":"Rabia Jafri, Syed\u00a0Abid Ali, and Hamid\u00a0R Arabnia. 2013. Face recognition for the visually impaired. In Proceedings of the International Conference on Information and Knowledge Engineering (IKE). The Steering Committee of The World Congress in Computer Science, Computer\u00a0\u2026, 1."},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2049536.2049573"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1639642.1639663"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/IEMBS.2010.5626038"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376398"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376591"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376498"},{"key":"e_1_3_2_2_48_1","volume-title":"Coping with Accessibility Challenges for Security-A User Study with Blind Smartphone Users. In IFIP Conference on Human-Computer Interaction. Springer, 3\u201322","author":"Lobo Sylvan","year":"2017","unstructured":"Sylvan Lobo, Ulemba Hirom, VS Shyama, Mridul Basumatori, and Pankaj Doke. 2017. Coping with Accessibility Challenges for Security-A User Study with Blind Smartphone Users. In IFIP Conference on Human-Computer Interaction. Springer, 3\u201322."},{"key":"e_1_3_2_2_49_1","unstructured":"LookTel. 2020. Instant Recognition Apps for Persons with Low Vision or Blindness. http:\/\/www.looktel.com\/. (Accessed on 01\/08\/2020)."},{"key":"e_1_3_2_2_50_1","unstructured":"Meredith\u00a0Ringel Morris. 2019. AI and Accessibility: A Discussion of Ethical Considerations. arXiv preprint arXiv:1908.08939(2019)."},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858116"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2661334.2661372"},{"key":"e_1_3_2_2_53_1","unstructured":"OrCam. 2020. Never Forget a Face. https:\/\/myme.orcam.com\/. (Accessed on 04\/21\/2020)."},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.398"},{"key":"e_1_3_2_2_55_1","unstructured":"Color\u00a0Blind Pal.2020. Color Blind Pal. https:\/\/colorblindpal.com\/. (Accessed on 01\/08\/2020)."},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2013.09.002"},{"key":"e_1_3_2_2_57_1","unstructured":"KNFB Reader. 2020. App features the best OCR. Turn print into speech or Braille instantly. iOS 3 now available. | KNFB Reader. https:\/\/knfbreader.com\/. (Accessed on 01\/08\/2020)."},{"key":"e_1_3_2_2_58_1","volume-title":"Rod Seung-Hwan Lim, and Judith Fullerton","author":"Sadler Georgia\u00a0Robins","year":"2010","unstructured":"Georgia\u00a0Robins Sadler, Hau-Chen Lee, Rod Seung-Hwan Lim, and Judith Fullerton. 2010. Recruitment of hard-to-reach population subgroups via adaptations of the snowball sampling strategy. Nursing & health sciences 12, 3 (2010), 369\u2013374."},{"key":"e_1_3_2_2_59_1","volume-title":"Are there universal aspects in the structure and contents of human values?Journal of social issues 50, 4","author":"Schwartz H","year":"1994","unstructured":"Shalom\u00a0H Schwartz. 1994. Are there universal aspects in the structure and contents of human values?Journal of social issues 50, 4 (1994), 19\u201345."},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979044"},{"key":"e_1_3_2_2_61_1","volume-title":"Information privacy: measuring individuals","author":"Smith H\u00a0Jeff","year":"1996","unstructured":"H\u00a0Jeff Smith, Sandra\u00a0J Milberg, and Sandra\u00a0J Burke. 1996. Information privacy: measuring individuals\u2019 concerns about organizational practices. MIS quarterly (1996), 167\u2013196."},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2631775.2631803"},{"key":"e_1_3_2_2_63_1","volume-title":"Qualitative analysis for social scientists","author":"Strauss L","unstructured":"Anselm\u00a0L Strauss. 1987. Qualitative analysis for social scientists. Cambridge university press."},{"key":"e_1_3_2_2_64_1","unstructured":"TapTapSee. 2020. Blind and Visually Impaired Assistive Technology - powered by CloudSight.ai Image Recognition API. https:\/\/taptapseeapp.com\/. (Accessed on 01\/08\/2020)."},{"key":"e_1_3_2_2_65_1","unstructured":"ToolWiz. 2020. Homepage. http:\/\/www.toolwiz.com\/lead\/toolwiz_eye\/. (Accessed on 04\/21\/2020)."},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3171533.3171538"},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557085"},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/2348283.2348292"},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702437"}],"event":{"name":"ASSETS '20: The 22nd International ACM SIGACCESS Conference on Computers and Accessibility","location":"Virtual Event Greece","acronym":"ASSETS '20","sponsor":["SIGACCESS ACM Special Interest Group on Accessible Computing"]},"container-title":["Proceedings of the 22nd International ACM SIGACCESS Conference on Computers and Accessibility"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3373625.3417014","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3373625.3417014","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:22Z","timestamp":1750203862000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3373625.3417014"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,26]]},"references-count":68,"alternative-id":["10.1145\/3373625.3417014","10.1145\/3373625"],"URL":"https:\/\/doi.org\/10.1145\/3373625.3417014","relation":{},"subject":[],"published":{"date-parts":[[2020,10,26]]},"assertion":[{"value":"2020-10-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}