{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,8]],"date-time":"2026-05-08T19:07:18Z","timestamp":1778267238425,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T00:00:00Z","timestamp":1651017600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-sa\/4.0\/"}],"funder":[{"name":"DGIST Start-up Fund Program of the Ministry of Science and ICT","award":["2021010011"],"award-info":[{"award-number":["2021010011"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,4,27]]},"DOI":"10.1145\/3491101.3519773","type":"proceedings-article","created":{"date-parts":[[2022,4,29]],"date-time":"2022-04-29T16:49:48Z","timestamp":1651250988000},"page":"1-7","source":"Crossref","is-referenced-by-count":13,"title":["Mine Yourself!: A Role-playing Privacy Tutorial in Virtual Reality Environment"],"prefix":"10.1145","author":[{"given":"Junsu","family":"Lim","sequence":"first","affiliation":[{"name":"Daegu Gyeongbuk Institute of Science and Technology, Korea, Republic of"}]},{"given":"Hyeonggeun","family":"Yun","sequence":"additional","affiliation":[{"name":"Agency for Defense Development, Korea, Republic of"}]},{"given":"Auejin","family":"Ham","sequence":"additional","affiliation":[{"name":"Korea Advanced Institute of Science and Technology, Korea, Republic of"}]},{"given":"Sunjun","family":"Kim","sequence":"additional","affiliation":[{"name":"Daegu Gyeongbuk Institute of Science and Technology (DGIST), Korea, Republic of"}]}],"member":"320","published-online":{"date-parts":[[2022,4,28]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Fourteenth Symposium on Usable Privacy and Security","author":"Adams Devon","year":"2018","unstructured":"Devon Adams , Alseny Bah , Catherine Barwulor , Nureli Musaby , Kadeem Pitkin , and Elissa\u00a0 M Redmiles . 2018 . Ethics emerging: the story of privacy and security perceptions in virtual reality . In Fourteenth Symposium on Usable Privacy and Security (2018). 427\u2013442. Devon Adams, Alseny Bah, Catherine Barwulor, Nureli Musaby, Kadeem Pitkin, and Elissa\u00a0M Redmiles. 2018. Ethics emerging: the story of privacy and security perceptions in virtual reality. In Fourteenth Symposium on Usable Privacy and Security (2018). 427\u2013442."},{"key":"e_1_3_2_2_2_1","volume-title":"Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources. Telematics and informatics 41","author":"Barth Susanne","year":"2019","unstructured":"Susanne Barth , Menno\u00a0 DT de Jong , Marianne Junger , Pieter\u00a0 H Hartel , and Janina\u00a0 C Roppelt . 2019. Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources. Telematics and informatics 41 ( 2019 ), 55\u201369. Susanne Barth, Menno\u00a0DT de Jong, Marianne Junger, Pieter\u00a0H Hartel, and Janina\u00a0C Roppelt. 2019. Putting the privacy paradox to the test: Online privacy and security behaviors among users with technical knowledge, privacy awareness, and financial resources. Telematics and informatics 41 (2019), 55\u201369."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858498"},{"key":"e_1_3_2_2_4_1","first-page":"2017","volume-title":"Retrieved","author":"Cakebread Caroline","year":"2017","unstructured":"Caroline Cakebread . 2017 . You\u2019re not alone, no one reads terms of service agreements . Retrieved November 28, 2020 from https:\/\/www.businessinsider.com\/deloitte-study-91-percent-agree-terms-of-service-without-reading- 2017 - 2011 . Caroline Cakebread. 2017. You\u2019re not alone, no one reads terms of service agreements. Retrieved November 28, 2020 from https:\/\/www.businessinsider.com\/deloitte-study-91-percent-agree-terms-of-service-without-reading-2017-11."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.nepr.2011.04.008"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174111"},{"key":"e_1_3_2_2_7_1","first-page":"47","article-title":"Webuse: Website usability evaluation tool","volume":"16","author":"Chiew Thiam\u00a0Kian","year":"2003","unstructured":"Thiam\u00a0Kian Chiew and Siti\u00a0Salwa Salim . 2003 . Webuse: Website usability evaluation tool . Malaysian Journal of Computer Science 16 , 1 (2003), 47 \u2013 57 . Thiam\u00a0Kian Chiew and Siti\u00a0Salwa Salim. 2003. Webuse: Website usability evaluation tool. Malaysian Journal of Computer Science 16, 1 (2003), 47\u201357.","journal-title":"Malaysian Journal of Computer Science"},{"key":"e_1_3_2_2_8_1","volume-title":"Retrieved","author":"Kakao\u00a0Enterprise Corp.","year":"2019","unstructured":"Kakao\u00a0Enterprise Corp. 2019 . Kakao Speech API . Retrieved December 17, 2020 from https:\/\/developers.kakao.com\/docs\/latest\/ko\/voice\/rest-api##speech-to-text. Kakao\u00a0Enterprise Corp. 2019. Kakao Speech API. Retrieved December 17, 2020 from https:\/\/developers.kakao.com\/docs\/latest\/ko\/voice\/rest-api##speech-to-text."},{"key":"e_1_3_2_2_9_1","first-page":"175","article-title":"Role-playing as a creative method in science education","volume":"10","author":"Craciun Dana","year":"2010","unstructured":"Dana Craciun . 2010 . Role-playing as a creative method in science education . Journal of Science and Arts 10 , 1 (2010), 175 . Dana Craciun. 2010. Role-playing as a creative method in science education. Journal of Science and Arts 10, 1 (2010), 175.","journal-title":"Journal of Science and Arts"},{"key":"e_1_3_2_2_11_1","volume-title":"AffectivelyVR: Towards VR Personalized Emotion Recognition. In 26th ACM Symposium on Virtual Reality Software and Technology. 1\u20133.","author":"Gupta Kunal","year":"2020","unstructured":"Kunal Gupta , Jovana Lazarevic , Yun\u00a0Suen Pai , and Mark Billinghurst . 2020 . AffectivelyVR: Towards VR Personalized Emotion Recognition. In 26th ACM Symposium on Virtual Reality Software and Technology. 1\u20133. Kunal Gupta, Jovana Lazarevic, Yun\u00a0Suen Pai, and Mark Billinghurst. 2020. AffectivelyVR: Towards VR Personalized Emotion Recognition. In 26th ACM Symposium on Virtual Reality Software and Technology. 1\u20133."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2556978"},{"key":"e_1_3_2_2_13_1","volume-title":"Reimagining Reality: Human Rights and Immersive Technology. Technical Report","author":"Heller Brittan","year":"2020","unstructured":"Brittan Heller . 2020 . Reimagining Reality: Human Rights and Immersive Technology. Technical Report . Carr Center Discussion Paper Series , June 12, 2020. https:\/\/carrcenter.hks.... Brittan Heller. 2020. Reimagining Reality: Human Rights and Immersive Technology. Technical Report. Carr Center Discussion Paper Series, June 12, 2020. https:\/\/carrcenter.hks...."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376529"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/985692.985752"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3407662.3407754"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753561"},{"key":"e_1_3_2_2_18_1","unstructured":"Orin\u00a0S Kerr. 2008. Criminal law in virtual worlds. U. Chi. Legal F. (2008) 415.  Orin\u00a0S Kerr. 2008. Criminal law in virtual worlds. U. Chi. Legal F. (2008) 415."},{"key":"e_1_3_2_2_19_1","volume-title":"Psychodrama: Group psychotherapy through role playing. International journal of group psychotherapy 42, 4(1992), 495\u2013521.","author":"Kipper A","year":"1992","unstructured":"David\u00a0 A Kipper . 1992 . Psychodrama: Group psychotherapy through role playing. International journal of group psychotherapy 42, 4(1992), 495\u2013521. David\u00a0A Kipper. 1992. Psychodrama: Group psychotherapy through role playing. International journal of group psychotherapy 42, 4(1992), 495\u2013521."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/QoMEX48832.2020.9123091"},{"key":"e_1_3_2_2_21_1","volume-title":"Impact of Constant Visual Biofeedback on User Experience in Virtual Reality Exergames. In 2019 IEEE International Symposium on Multimedia (ISM). IEEE, 307\u20133073","author":"Koji\u0107 Tanja","year":"2019","unstructured":"Tanja Koji\u0107 , Lan\u00a0Thao Nugyen , and Jan-Niklas Voigt-Antons . 2019 . Impact of Constant Visual Biofeedback on User Experience in Virtual Reality Exergames. In 2019 IEEE International Symposium on Multimedia (ISM). IEEE, 307\u20133073 . Tanja Koji\u0107, Lan\u00a0Thao Nugyen, and Jan-Niklas Voigt-Antons. 2019. Impact of Constant Visual Biofeedback on User Experience in Virtual Reality Exergames. In 2019 IEEE International Symposium on Multimedia (ISM). IEEE, 307\u20133073."},{"key":"e_1_3_2_2_22_1","first-page":"660","article-title":"The use of role playing as a technique in the psychotherapy of children.Psychotherapy: Theory, Research, Practice","volume":"28","author":"Levenson L","year":"1991","unstructured":"Richard\u00a0 L Levenson and Jack Herman . 1991 . The use of role playing as a technique in the psychotherapy of children.Psychotherapy: Theory, Research, Practice , Training 28 , 4 (1991), 660 . Richard\u00a0L Levenson and Jack Herman. 1991. The use of role playing as a technique in the psychotherapy of children.Psychotherapy: Theory, Research, Practice, Training 28, 4 (1991), 660.","journal-title":"Training"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02806-9_12"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300897"},{"key":"e_1_3_2_2_25_1","volume-title":"Retrieved","author":"Facebook\u00a0Technologies","year":"2020","unstructured":"Facebook\u00a0Technologies LLC. 2020 . Oculus Terms of Service . Retrieved December 17, 2020 from https:\/\/www.oculus.com\/legal\/privacy-policy\/. Facebook\u00a0Technologies LLC. 2020. Oculus Terms of Service. Retrieved December 17, 2020 from https:\/\/www.oculus.com\/legal\/privacy-policy\/."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2481371"},{"key":"e_1_3_2_2_27_1","volume-title":"Measuring usability with the use questionnaire12. Usability interface 8, 2","author":"Lund M","year":"2001","unstructured":"Arnold\u00a0 M Lund . 2001. Measuring usability with the use questionnaire12. Usability interface 8, 2 ( 2001 ), 3\u20136. Arnold\u00a0M Lund. 2001. Measuring usability with the use questionnaire12. Usability interface 8, 2 (2001), 3\u20136."},{"key":"e_1_3_2_2_28_1","unstructured":"Philipp Mayring. 2019. Qualitative content analysis: Demarcation varieties developments. In Forum: Qualitative Social Research Vol.\u00a020. Freie Universit\u00e4t Berlin 1\u201326.  Philipp Mayring. 2019. Qualitative content analysis: Demarcation varieties developments. In Forum: Qualitative Social Research Vol.\u00a020. Freie Universit\u00e4t Berlin 1\u201326."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753398"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851581.2892455"},{"key":"e_1_3_2_2_31_1","volume-title":"It Dies in Real Life. Retrieved","author":"Mir Rory","year":"2020","unstructured":"Rory Mir and Katitza Rodriguez . 2020. If Privacy Dies in VR , It Dies in Real Life. Retrieved December 2, 2020 from https:\/\/www.eff.org\/ko\/deeplinks\/2020\/08\/if-privacy-dies-vr-it-dies-real-life. Rory Mir and Katitza Rodriguez. 2020. If Privacy Dies in VR, It Dies in Real Life. Retrieved December 2, 2020 from https:\/\/www.eff.org\/ko\/deeplinks\/2020\/08\/if-privacy-dies-vr-it-dies-real-life."},{"key":"e_1_3_2_2_32_1","volume-title":"International journal of role-playing 1, 1","author":"Montola Markus","year":"2009","unstructured":"Markus Montola . 2009. The invisible rules of role-playing: the social framework of role-playing process . International journal of role-playing 1, 1 ( 2009 ), 22\u201336. Markus Montola. 2009. The invisible rules of role-playing: the social framework of role-playing process. International journal of role-playing 1, 1 (2009), 22\u201336."},{"key":"e_1_3_2_2_33_1","first-page":"395","article-title":"A virtual property solution: How privacy law can protect the citizens of virtual worlds. Okla","volume":"36","author":"Nelson John\u00a0William","year":"2011","unstructured":"John\u00a0William Nelson . 2011 . A virtual property solution: How privacy law can protect the citizens of virtual worlds. Okla . City UL Rev. 36 (2011), 395 . John\u00a0William Nelson. 2011. A virtual property solution: How privacy law can protect the citizens of virtual worlds. Okla. City UL Rev. 36(2011), 395.","journal-title":"City UL Rev."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.3390\/s20102944"},{"key":"e_1_3_2_2_35_1","volume-title":"The convergence of virtual reality and social networks: threats to privacy and autonomy. Science and engineering ethics 22, 1","author":"O\u2019Brolch\u00e1in Fiachra","year":"2016","unstructured":"Fiachra O\u2019Brolch\u00e1in , Tim Jacquemard , David Monaghan , Noel O\u2019Connor , Peter Novitzky , and Bert Gordijn . 2016. The convergence of virtual reality and social networks: threats to privacy and autonomy. Science and engineering ethics 22, 1 ( 2016 ), 1\u201329. Fiachra O\u2019Brolch\u00e1in, Tim Jacquemard, David Monaghan, Noel O\u2019Connor, Peter Novitzky, and Bert Gordijn. 2016. The convergence of virtual reality and social networks: threats to privacy and autonomy. Science and engineering ethics 22, 1 (2016), 1\u201329."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10648-014-9255-5"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1709886.1709913"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445465"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2580723.2580730"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.5555\/2835536.2835540"},{"key":"e_1_3_2_2_41_1","unstructured":"Aili Shi Yamin Wang and Nan Ding. 2019. The effect of game\u2013based immersive virtual reality learning environment on learning outcomes: designing an intrinsic integrated educational game for pre\u2013class learning. Interactive Learning Environments(2019) 1\u201314.  Aili Shi Yamin Wang and Nan Ding. 2019. The effect of game\u2013based immersive virtual reality learning environment on learning outcomes: designing an intrinsic integrated educational game for pre\u2013class learning. Interactive Learning Environments(2019) 1\u201314."},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314111.3319915"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858448"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/985692.985753"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173774"},{"key":"e_1_3_2_2_46_1","first-page":"1","volume-title":"Retrieved","author":"Union European","year":"2016","unstructured":"European Union . 2016 . General Data Protection Regulation . Retrieved January 11, 2022 from https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=uriserv:OJ.L_.2016.119.01.0001.01.ENG&toc=OJ:L:2016:119:FULL#d1e6191- 1 - 1 . European Union. 2016. General Data Protection Regulation. Retrieved January 11, 2022 from https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=uriserv:OJ.L_.2016.119.01.0001.01.ENG&toc=OJ:L:2016:119:FULL#d1e6191-1-1."},{"key":"e_1_3_2_2_47_1","volume-title":"Privacy, Norms, and Consent. January","author":"Richard Warner and Robert Sloan. 2013. Scholarly Commons @ IIT Chicago-Kent College of Law Beyond Notice and Choice","year":"2013","unstructured":"Richard Warner and Robert Sloan. 2013. Scholarly Commons @ IIT Chicago-Kent College of Law Beyond Notice and Choice : Privacy, Norms, and Consent. January ( 2013 ). Richard Warner and Robert Sloan. 2013. Scholarly Commons @ IIT Chicago-Kent College of Law Beyond Notice and Choice : Privacy, Norms, and Consent. January (2013)."},{"key":"e_1_3_2_2_48_1","volume-title":"Crime risks of three-dimensional virtual environments. Trends and issues in crime and criminal justice388","author":"Warren Ian","year":"2010","unstructured":"Ian Warren , Darren Palmer , 2010. Crime risks of three-dimensional virtual environments. Trends and issues in crime and criminal justice388 ( 2010 ), 1. Ian Warren, Darren Palmer, 2010. Crime risks of three-dimensional virtual environments. Trends and issues in crime and criminal justice388 (2010), 1."},{"key":"e_1_3_2_2_49_1","volume-title":"ICIS 2005 proceedings(2005)","author":"Xu Heng","year":"2005","unstructured":"Heng Xu , Hock-Hai Teo , and Bernard Tan . 2005 . Predicting the adoption of location-based services: the role of trust and perceived privacy risk . ICIS 2005 proceedings(2005) , 71. Heng Xu, Hock-Hai Teo, and Bernard Tan. 2005. Predicting the adoption of location-based services: the role of trust and perceived privacy risk. ICIS 2005 proceedings(2005), 71."},{"key":"e_1_3_2_2_50_1","first-page":"27","article-title":"Oculus vr best practices guide","volume":"4","author":"Yao Richard","year":"2014","unstructured":"Richard Yao , Tom Heath , Aaron Davies , Tom Forsyth , Nate Mitchell , and Perry Hoberman . 2014 . Oculus vr best practices guide . Oculus VR 4 (2014), 27 \u2013 35 . Richard Yao, Tom Heath, Aaron Davies, Tom Forsyth, Nate Mitchell, and Perry Hoberman. 2014. Oculus vr best practices guide. Oculus VR 4(2014), 27\u201335.","journal-title":"Oculus VR"}],"event":{"name":"CHI '22: CHI Conference on Human Factors in Computing Systems","location":"New Orleans LA USA","acronym":"CHI '22","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["CHI Conference on Human Factors in Computing Systems Extended Abstracts"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3491101.3519773","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3491101.3519773","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:31:00Z","timestamp":1750188660000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3491101.3519773"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,27]]},"references-count":49,"alternative-id":["10.1145\/3491101.3519773","10.1145\/3491101"],"URL":"https:\/\/doi.org\/10.1145\/3491101.3519773","relation":{},"subject":[],"published":{"date-parts":[[2022,4,27]]}}}