{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T19:08:17Z","timestamp":1776107297613,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":68,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,4,29]],"date-time":"2022-04-29T00:00:00Z","timestamp":1651190400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,4,29]]},"DOI":"10.1145\/3491102.3502140","type":"proceedings-article","created":{"date-parts":[[2022,4,28]],"date-time":"2022-04-28T16:34:58Z","timestamp":1651163698000},"page":"1-14","source":"Crossref","is-referenced-by-count":15,"title":["Consent in the Age of AR: Investigating The Comfort With Displaying Personal Information in Augmented Reality"],"prefix":"10.1145","author":[{"given":"Jan Ole","family":"Rixen","sequence":"first","affiliation":[{"name":"Institute of Media Informatics, Ulm University, Germany"}]},{"given":"Mark","family":"Colley","sequence":"additional","affiliation":[{"name":"Institute of Media Informatics, Ulm University, Germany"}]},{"given":"Ali","family":"Askari","sequence":"additional","affiliation":[{"name":"Institute of Media Informatics, Ulm University, Germany"}]},{"given":"Jan","family":"Gugenheimer","sequence":"additional","affiliation":[{"name":"T\u00e9l\u00e9com Paris - LTCI, Institut Polytechnique de Paris, France"}]},{"given":"Enrico","family":"Rukzio","sequence":"additional","affiliation":[{"name":"Institute of Media Informatics, Ulm University, Germany"}]}],"member":"320","published-online":{"date-parts":[[2022,4,29]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.v6i2.638"},{"key":"e_1_3_2_2_2_1","volume-title":"Sixth International AAAI Conference on Weblogs and Social Media. AAAI","author":"Al\u00a0Zamal Faiyaz","year":"2012","unstructured":"Faiyaz Al\u00a0Zamal , Wendy Liu , and Derek Ruths . 2012 . Homophily and latent attribute inference: Inferring latent attributes of twitter users from neighbors . In Sixth International AAAI Conference on Weblogs and Social Media. AAAI , Dublin, Ireland. Faiyaz Al\u00a0Zamal, Wendy Liu, and Derek Ruths. 2012. Homophily and latent attribute inference: Inferring latent attributes of twitter users from neighbors. In Sixth International AAAI Conference on Weblogs and Social Media. AAAI, Dublin, Ireland."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173884"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2018.111"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998243"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3041164.3041203"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2994620.2994629"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1111\/1540-4560.00247"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1111\/jcom.12106"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2017.62"},{"key":"e_1_3_2_2_11_1","volume-title":"The development of anxiety: the role of control in the early environment.Psychological bulletin 124, 1","author":"Chorpita F","year":"1998","unstructured":"Bruce\u00a0 F Chorpita and David\u00a0 H Barlow . 1998. The development of anxiety: the role of control in the early environment.Psychological bulletin 124, 1 ( 1998 ), 3. Bruce\u00a0F Chorpita and David\u00a0H Barlow. 1998. The development of anxiety: the role of control in the early environment.Psychological bulletin 124, 1 (1998), 3."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376389"},{"key":"e_1_3_2_2_13_1","volume-title":"Exploratory study examining the at-home feasibility of a wearable tool for social-affective learning in children with autism. NPJ digital medicine 1, 1","author":"Daniels Jena","year":"2018","unstructured":"Jena Daniels , Jessey\u00a0 N Schwartz , Catalin Voss , Nick Haber , Azar Fazel , Aaron Kline , Peter Washington , Carl Feinstein , Terry Winograd , and Dennis\u00a0 P Wall . 2018. Exploratory study examining the at-home feasibility of a wearable tool for social-affective learning in children with autism. NPJ digital medicine 1, 1 ( 2018 ), 1\u201310. Jena Daniels, Jessey\u00a0N Schwartz, Catalin Voss, Nick Haber, Azar Fazel, Aaron Kline, Peter Washington, Carl Feinstein, Terry Winograd, and Dennis\u00a0P Wall. 2018. Exploratory study examining the at-home feasibility of a wearable tool for social-affective learning in children with autism. NPJ digital medicine 1, 1 (2018), 1\u201310."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466447"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2464464.2464480"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531675"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504733"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1196\/annals.1280.010"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-019-05860-9"},{"key":"e_1_3_2_2_20_1","volume-title":"Learning race from face: A survey","author":"Fu Siyao","year":"2014","unstructured":"Siyao Fu , Haibo He , and Zeng-Guang Hou . 2014. Learning race from face: A survey . IEEE transactions on pattern analysis and machine intelligence 36, 12( 2014 ), 2483\u20132509. Siyao Fu, Haibo He, and Zeng-Guang Hou. 2014. Learning race from face: A survey. IEEE transactions on pattern analysis and machine intelligence 36, 12(2014), 2483\u20132509."},{"key":"e_1_3_2_2_21_1","volume-title":"Social Friends and Behaviors. In 25th USENIX Security Symposium (USENIX Security 16)","author":"Gong Neil\u00a0Zhenqiang","year":"2016","unstructured":"Neil\u00a0Zhenqiang Gong and Bin Liu . 2016 . You Are Who You Know and How You Behave: Attribute Inference Attacks via Users\u2019 Social Friends and Behaviors. In 25th USENIX Security Symposium (USENIX Security 16) . USENIX Association, Austin, TX, 979\u2013995. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/gong Neil\u00a0Zhenqiang Gong and Bin Liu. 2016. You Are Who You Know and How You Behave: Attribute Inference Attacks via Users\u2019 Social Friends and Behaviors. In 25th USENIX Security Symposium (USENIX Security 16). USENIX Association, Austin, TX, 979\u2013995. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/gong"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2598510.2598587"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1177\/014616702237652"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2582051.2582083"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702613.2732833"},{"key":"e_1_3_2_2_26_1","volume-title":"Gaydar: Facebook friendships expose sexual orientation. First Monday","author":"Jernigan Carter","year":"2009","unstructured":"Carter Jernigan and Behram\u00a0 FT Mistree . 2009 . Gaydar: Facebook friendships expose sexual orientation. First Monday (2009). Carter Jernigan and Behram\u00a0FT Mistree. 2009. Gaydar: Facebook friendships expose sexual orientation. First Monday (2009)."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"crossref","unstructured":"Sidney\u00a0M Jourard and Paul Lasakow. 1958. Some factors in self-disclosure.The Journal of Abnormal and Social Psychology 56 1(1958) 91.  Sidney\u00a0M Jourard and Paul Lasakow. 1958. Some factors in self-disclosure.The Journal of Abnormal and Social Psychology 56 1(1958) 91.","DOI":"10.1037\/h0043357"},{"key":"e_1_3_2_2_28_1","volume-title":"Proceedings of the Ninth International Conference on Tangible, Embedded, and Embodied Interaction","author":"Chris Schmandt Kao","year":"2015","unstructured":"Hsin-Liu\u00a0(Cindy) Kao and Chris Schmandt . 2015 . MugShots: A Mug Display for Front and Back Stage Social Interaction in the Workplace . In Proceedings of the Ninth International Conference on Tangible, Embedded, and Embodied Interaction ( Stanford, California, USA) (TEI \u201915). Association for Computing Machinery, New York, NY, USA, 57\u201360. https:\/\/doi.org\/10.1145\/2677199.2680557 Hsin-Liu\u00a0(Cindy) Kao and Chris Schmandt. 2015. MugShots: A Mug Display for Front and Back Stage Social Interaction in the Workplace. In Proceedings of the Ninth International Conference on Tangible, Embedded, and Embodied Interaction (Stanford, California, USA) (TEI \u201915). Association for Computing Machinery, New York, NY, USA, 57\u201360. https:\/\/doi.org\/10.1145\/2677199.2680557"},{"key":"e_1_3_2_2_29_1","volume-title":"Sense of control predicts depressive and anxious symptoms across the transition to parenthood.Journal of family psychology 22, 2","author":"Keeton Courtney\u00a0Pierce","year":"2008","unstructured":"Courtney\u00a0Pierce Keeton , Maureen Perry-Jenkins , and Aline\u00a0 G Sayer . 2008. Sense of control predicts depressive and anxious symptoms across the transition to parenthood.Journal of family psychology 22, 2 ( 2008 ), 212. Courtney\u00a0Pierce Keeton, Maureen Perry-Jenkins, and Aline\u00a0G Sayer. 2008. Sense of control predicts depressive and anxious symptoms across the transition to parenthood.Journal of family psychology 22, 2 (2008), 212."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376162"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025749"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785830.2785842"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/PerComW.2012.6197511"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1177\/0162243918793711"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1959826.1959857"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10606-017-9281-1"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2017.02.007"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"crossref","unstructured":"Julie\u00a0D Lane and Daniel\u00a0M Wegner. 1995. The cognitive consequences of secrecy.Journal of personality and social psychology 69 2(1995) 237.  Julie\u00a0D Lane and Daniel\u00a0M Wegner. 1995. The cognitive consequences of secrecy.Journal of personality and social psychology 69 2(1995) 237.","DOI":"10.1037\/0022-3514.69.2.237"},{"key":"e_1_3_2_2_39_1","volume-title":"Effects of anonymity, invisibility, and lack of eye-contact on toxic online disinhibition. Computers in human behavior 28, 2","author":"Lapidot-Lefler Noam","year":"2012","unstructured":"Noam Lapidot-Lefler and Azy Barak . 2012. Effects of anonymity, invisibility, and lack of eye-contact on toxic online disinhibition. Computers in human behavior 28, 2 ( 2012 ), 434\u2013443. Noam Lapidot-Lefler and Azy Barak. 2012. Effects of anonymity, invisibility, and lack of eye-contact on toxic online disinhibition. Computers in human behavior 28, 2 (2012), 434\u2013443."},{"key":"e_1_3_2_2_40_1","volume-title":"Towards reading hidden emotions: A comparative study of spontaneous micro-expression spotting and recognition methods","author":"Li Xiaobai","year":"2017","unstructured":"Xiaobai Li , Xiaopeng Hong , Antti Moilanen , Xiaohua Huang , Tomas Pfister , Guoying Zhao , and Matti Pietik\u00e4inen . 2017. Towards reading hidden emotions: A comparative study of spontaneous micro-expression spotting and recognition methods . IEEE transactions on affective computing 9, 4 ( 2017 ), 563\u2013577. Xiaobai Li, Xiaopeng Hong, Antti Moilanen, Xiaohua Huang, Tomas Pfister, Guoying Zhao, and Matti Pietik\u00e4inen. 2017. Towards reading hidden emotions: A comparative study of spontaneous micro-expression spotting and recognition methods. IEEE transactions on affective computing 9, 4 (2017), 563\u2013577."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526899"},{"key":"e_1_3_2_2_42_1","volume-title":"Feasibility of an autism-focused augmented reality smartglasses system for social communication and behavioral coaching. Frontiers in pediatrics 5","author":"Liu Runpeng","year":"2017","unstructured":"Runpeng Liu , Joseph\u00a0 P Salisbury , Arshya Vahabzadeh , and Ned\u00a0 T Sahin . 2017. Feasibility of an autism-focused augmented reality smartglasses system for social communication and behavioral coaching. Frontiers in pediatrics 5 ( 2017 ), 145. Runpeng Liu, Joseph\u00a0P Salisbury, Arshya Vahabzadeh, and Ned\u00a0T Sahin. 2017. Feasibility of an autism-focused augmented reality smartglasses system for social communication and behavioral coaching. Frontiers in pediatrics 5 (2017), 145."},{"key":"e_1_3_2_2_43_1","volume-title":"Managers and moral dissonance: Self justification as a big threat to ethical management?Journal of Business Ethics 105, 1","author":"Lowell Jonathan","year":"2012","unstructured":"Jonathan Lowell . 2012. Managers and moral dissonance: Self justification as a big threat to ethical management?Journal of Business Ethics 105, 1 ( 2012 ), 17\u201325. Jonathan Lowell. 2012. Managers and moral dissonance: Self justification as a big threat to ethical management?Journal of Business Ethics 105, 1 (2012), 17\u201325."},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858414"},{"key":"e_1_3_2_2_45_1","volume-title":"I Don\u2019t Know How to Protect Myself\u201d: Understanding Privacy Perceptions Resulting from the Presence of Bystanders in Smart Environments","author":"Marky Karola","year":"1924","unstructured":"Karola Marky , Alexandra Voit , Alina St\u00f6ver , Kai Kunze , Svenja Schr\u00f6der , and Max M\u00fchlh\u00e4user . 2020. \u201d I Don\u2019t Know How to Protect Myself\u201d: Understanding Privacy Perceptions Resulting from the Presence of Bystanders in Smart Environments . Association for Computing Machinery , New York, NY, USA . https:\/\/doi.org\/10.1145\/34 1924 9.3420164 Karola Marky, Alexandra Voit, Alina St\u00f6ver, Kai Kunze, Svenja Schr\u00f6der, and Max M\u00fchlh\u00e4user. 2020. \u201dI Don\u2019t Know How to Protect Myself\u201d: Understanding Privacy Perceptions Resulting from the Presence of Bystanders in Smart Environments. Association for Computing Machinery, New York, NY, USA. https:\/\/doi.org\/10.1145\/3419249.3420164"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1031607.1031615"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3012709.3012731"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1718487.1718519"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702411"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.appdev.2008.12.010"},{"key":"e_1_3_2_2_51_1","volume-title":"Advances in experimental social psychology. Vol.\u00a022","author":"Pennebaker W","unstructured":"James\u00a0 W Pennebaker . 1989. Confession , inhibition, and disease . In Advances in experimental social psychology. Vol.\u00a022 . Elsevier , 211\u2013244. James\u00a0W Pennebaker. 1989. Confession, inhibition, and disease. In Advances in experimental social psychology. Vol.\u00a022. Elsevier, 211\u2013244."},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185354.2185358"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2013.07.030"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753458"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445597"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660460.2660470"},{"key":"e_1_3_2_2_57_1","volume-title":"Controlling ourselves, controlling our world: Psychology\u2019s role in understanding positive and negative consequences of seeking and gaining control.American psychologist 51, 12","author":"Shapiro\u00a0Jr H","year":"1996","unstructured":"Deane\u00a0 H Shapiro\u00a0Jr , Carolyn\u00a0 E Schwartz , and John\u00a0 A Astin . 1996. Controlling ourselves, controlling our world: Psychology\u2019s role in understanding positive and negative consequences of seeking and gaining control.American psychologist 51, 12 ( 1996 ), 1213. Deane\u00a0H Shapiro\u00a0Jr, Carolyn\u00a0E Schwartz, and John\u00a0A Astin. 1996. Controlling ourselves, controlling our world: Psychology\u2019s role in understanding positive and negative consequences of seeking and gaining control.American psychologist 51, 12 (1996), 1213."},{"key":"e_1_3_2_2_58_1","volume-title":"Stereotype susceptibility: Identity salience and shifts in quantitative performance. Psychological science 10, 1","author":"Shih Margaret","year":"1999","unstructured":"Margaret Shih , Todd\u00a0 L Pittinsky , and Nalini Ambady . 1999. Stereotype susceptibility: Identity salience and shifts in quantitative performance. Psychological science 10, 1 ( 1999 ), 80\u201383. Margaret Shih, Todd\u00a0L Pittinsky, and Nalini Ambady. 1999. Stereotype susceptibility: Identity salience and shifts in quantitative performance. Psychological science 10, 1 (1999), 80\u201383."},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1177\/0022022117698039"},{"key":"e_1_3_2_2_60_1","volume-title":"Self-disclosure","author":"Stiles B","unstructured":"William\u00a0 B Stiles . 1987. I have to talk to somebody . In Self-disclosure . Springer , 257\u2013282. William\u00a0B Stiles. 1987. I have to talk to somebody. In Self-disclosure. Springer, 257\u2013282."},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1202129109"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14527-8_14"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"crossref","unstructured":"Yilun Wang and Michal Kosinski. 2018. Deep neural networks are more accurate than humans at detecting sexual orientation from facial images.Journal of personality and social psychology 114 2(2018) 246.  Yilun Wang and Michal Kosinski. 2018. Deep neural networks are more accurate than humans at detecting sexual orientation from facial images.Journal of personality and social psychology 114 2(2018) 246.","DOI":"10.1037\/pspa0000098"},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"crossref","unstructured":"Daniel\u00a0M Wegner David\u00a0J Schneider Samuel\u00a0R Carter and Teri\u00a0L White. 1987. Paradoxical effects of thought suppression.Journal of personality and social psychology 53 1(1987) 5.  Daniel\u00a0M Wegner David\u00a0J Schneider Samuel\u00a0R Carter and Teri\u00a0L White. 1987. Paradoxical effects of thought suppression.Journal of personality and social psychology 53 1(1987) 5.","DOI":"10.1037\/0022-3514.53.1.5"},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2009.0365"},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1186\/s41070-016-0011-8"},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526781"},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2017.2784430"}],"event":{"name":"CHI '22: CHI Conference on Human Factors in Computing Systems","location":"New Orleans LA USA","acronym":"CHI '22","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3491102.3502140","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3491102.3502140","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:31:23Z","timestamp":1750188683000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3491102.3502140"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,29]]},"references-count":68,"alternative-id":["10.1145\/3491102.3502140","10.1145\/3491102"],"URL":"https:\/\/doi.org\/10.1145\/3491102.3502140","relation":{},"subject":[],"published":{"date-parts":[[2022,4,29]]}}}