{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T14:36:39Z","timestamp":1776090999720,"version":"3.50.1"},"reference-count":49,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2021,12,27]],"date-time":"2021-12-27T00:00:00Z","timestamp":1640563200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["SaTC-2029519"],"award-info":[{"award-number":["SaTC-2029519"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Interact. Mob. Wearable Ubiquitous Technol."],"published-print":{"date-parts":[[2021,12,27]]},"abstract":"<jats:p>Laptop webcams can be covertly activated by malware and law enforcement agencies. Consequently, 59% percent of Americans manually cover their webcams to avoid being surveilled. However, manual covers are prone to human error---through a survey with 200 users, we found that 61.5% occasionally forget to re-attach their cover after using their webcam. To address this problem, we developed Smart Webcam Cover (SWC): a thin film that covers the webcam (PDLC-overlay) by default until a user manually uncovers the webcam, and automatically covers the webcam when not in use. Through a two-phased design iteration process, we evaluated SWC with 20 webcam cover users through a remote study with a video prototype of SWC, compared to manual operation, and discussed factors that influence users' trust in the effectiveness of SWC and their perceptions of its utility.<\/jats:p>","DOI":"10.1145\/3494983","type":"journal-article","created":{"date-parts":[[2021,12,30]],"date-time":"2021-12-30T17:40:33Z","timestamp":1640886033000},"page":"1-21","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Smart Webcam Cover"],"prefix":"10.1145","volume":"5","author":[{"given":"Youngwook","family":"Do","sequence":"first","affiliation":[{"name":"Georgia Institute of Technology, School of Interactive Computing, Atlanta, GA, USA"}]},{"given":"Jung Wook","family":"Park","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, School of Interactive Computing, Atlanta, GA, USA"}]},{"given":"Yuxi","family":"Wu","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, School of Computer Science, Atlanta, GA, USA"}]},{"given":"Avinandan","family":"Basu","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, School of Computer Science, Atlanta, GA, USA"}]},{"given":"Dingtian","family":"Zhang","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, School of Computer Science, Atlanta, GA, USA"}]},{"given":"Gregory D.","family":"Abowd","sequence":"additional","affiliation":[{"name":"Northeastern University, Department of Electrical and Computer Engineering, Boston, MA, USA, Georgia Institute of Technology, School of Interactive Computing, Atlanta, GA, USA"}]},{"given":"Sauvik","family":"Das","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, School of Interactive Computing, Atlanta, GA, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,12,30]]},"reference":[{"key":"e_1_2_2_1_1","unstructured":"2014. Purism Librem 14. https:\/\/puri.sm\/ (Accessed on 09\/07\/2020).  2014. Purism Librem 14. https:\/\/puri.sm\/ (Accessed on 09\/07\/2020)."},{"key":"e_1_2_2_2_1","unstructured":"2018. Facebook Portal. https:\/\/portal.facebook.com\/. (Accessed on 09\/07\/2020).  2018. Facebook Portal. https:\/\/portal.facebook.com\/. (Accessed on 09\/07\/2020)."},{"key":"e_1_2_2_3_1","unstructured":"2020. ThinkPad X1 Extreme Gen 2 Laptop. https:\/\/www.lenovo.com\/us\/en\/laptops\/thinkpad\/thinkpad-x1\/X1-Extreme-Gen-2\/p\/22TP2TXX1E2 (Accessed on 09\/07\/2020).  2020. ThinkPad X1 Extreme Gen 2 Laptop. https:\/\/www.lenovo.com\/us\/en\/laptops\/thinkpad\/thinkpad-x1\/X1-Extreme-Gen-2\/p\/22TP2TXX1E2 (Accessed on 09\/07\/2020)."},{"key":"e_1_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3415187"},{"key":"e_1_2_2_5_1","first-page":"3","volume-title":"Proceedings of the ACM on interactive, mobile, wearable and ubiquitous technologies 3","author":"Alharbi Rawan","year":"2019","unstructured":"Rawan Alharbi , Mariam Tolba , Lucia C Petito , Josiah Hester , and Nabil Alshurafa . 2019 . To mask or not to mask? balancing privacy with visual confirmation utility in activity-oriented wearable cameras . Proceedings of the ACM on interactive, mobile, wearable and ubiquitous technologies 3 , 3 (2019), 1--29. Rawan Alharbi, Mariam Tolba, Lucia C Petito, Josiah Hester, and Nabil Alshurafa. 2019. To mask or not to mask? balancing privacy with visual confirmation utility in activity-oriented wearable cameras. Proceedings of the ACM on interactive, mobile, wearable and ubiquitous technologies 3, 3 (2019), 1--29."},{"key":"e_1_2_2_6_1","unstructured":"Apple. 2020. Don't close your MacBook MacBook Air or MacBook Pro with a cover over the camera. https:\/\/support.apple.com\/en-us\/HT211148  Apple. 2020. Don't close your MacBook MacBook Air or MacBook Pro with a cover over the camera. https:\/\/support.apple.com\/en-us\/HT211148"},{"key":"e_1_2_2_7_1","unstructured":"Jenni Balthrop. 2019. HP Survey highlights webcam security and privacy behaviors. https:\/\/press.hp.com\/us\/en\/press-releases\/2019\/awareness-of-webcam-hacking.html. (Accessed on 09\/09\/2020).  Jenni Balthrop. 2019. HP Survey highlights webcam security and privacy behaviors. https:\/\/press.hp.com\/us\/en\/press-releases\/2019\/awareness-of-webcam-hacking.html. (Accessed on 09\/09\/2020)."},{"key":"e_1_2_2_8_1","volume-title":"Proc. SOUPS","volume":"8","author":"Besmer Andrew","year":"2008","unstructured":"Andrew Besmer and Heather Richter Lipford . 2008 . Privacy perceptions of photo sharing in facebook . In Proc. SOUPS , Vol. 8 . Andrew Besmer and Heather Richter Lipford. 2008. Privacy perceptions of photo sharing in facebook. In Proc. SOUPS, Vol. 8."},{"key":"e_1_2_2_9_1","volume-title":"23rd {USENIX} Security Symposium ({USENIX} Security 14). 337--352.","author":"Brocker Matthew","unstructured":"Matthew Brocker and Stephen Checkoway . 2014. iSeeYou: Disabling the MacBook Webcam Indicator {LED} . In 23rd {USENIX} Security Symposium ({USENIX} Security 14). 337--352. Matthew Brocker and Stephen Checkoway. 2014. iSeeYou: Disabling the MacBook Webcam Indicator {LED}. In 23rd {USENIX} Security Symposium ({USENIX} Security 14). 337--352."},{"key":"e_1_2_2_10_1","first-page":"35","article-title":"Make your service fail-safe","volume":"35","author":"Chase Richard B","year":"1994","unstructured":"Richard B Chase and Douglas M Stewart . 1994 . Make your service fail-safe . MIT Sloan Management Review 35 , 3 (1994), 35 . Richard B Chase and Douglas M Stewart. 1994. Make your service fail-safe. MIT Sloan Management Review 35, 3 (1994), 35.","journal-title":"MIT Sloan Management Review"},{"key":"e_1_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376304"},{"key":"e_1_2_2_12_1","unstructured":"Lorrie F Cranor. 2008. A framework for reasoning about the human in the loop. (2008).  Lorrie F Cranor. 2008. A framework for reasoning about the human in the loop. (2008)."},{"key":"e_1_2_2_13_1","volume-title":"10th Symposium On Usable Privacy and Security ({SOUPS}","author":"Das Sauvik","year":"2014","unstructured":"Sauvik Das , Tiffany Hyun-Jin Kim , Laura A Dabbish , and Jason I Hong . 2014 . The effect of social influence on security sensitivity . In 10th Symposium On Usable Privacy and Security ({SOUPS} 2014). 143--157. Sauvik Das, Tiffany Hyun-Jin Kim, Laura A Dabbish, and Jason I Hong. 2014. The effect of social influence on security sensitivity. In 10th Symposium On Usable Privacy and Security ({SOUPS} 2014). 143--157."},{"key":"e_1_2_2_14_1","unstructured":"Matt Day Giles Turner and Natalia Drozdiak. 2019. Is Anyone Listening to You on Alexa? A Global Team Reviews Audio. https:\/\/www.bloomberg.com\/news\/articles\/2019-04-10\/is-anyone-listening-to-you-on-alexa-a-global-team-reviews-audio  Matt Day Giles Turner and Natalia Drozdiak. 2019. Is Anyone Listening to You on Alexa? A Global Team Reviews Audio. https:\/\/www.bloomberg.com\/news\/articles\/2019-04-10\/is-anyone-listening-to-you-on-alexa-a-global-team-reviews-audio"},{"key":"e_1_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557352"},{"key":"e_1_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-004-0308-5"},{"key":"e_1_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300890"},{"key":"e_1_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124862"},{"key":"e_1_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2632048.2632079"},{"key":"e_1_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124923"},{"key":"e_1_2_2_21_1","unstructured":"Apple Inc. 2020. Don't close your MacBook MacBook Air or MacBook Pro with a cover over the camera. https:\/\/support.apple.com\/en-us\/HT211148 (Accessed on 09\/12\/2020).  Apple Inc. 2020. Don't close your MacBook MacBook Air or MacBook Pro with a cover over the camera. https:\/\/support.apple.com\/en-us\/HT211148 (Accessed on 09\/12\/2020)."},{"key":"e_1_2_2_22_1","unstructured":"Shanghai HOHO Industry. [n.d.]. HoHo Smart PDLC Film. http:\/\/www.hohotint.com\/list-10-1.html (Accessed on 09\/12\/2020).  Shanghai HOHO Industry. [n.d.]. HoHo Smart PDLC Film. http:\/\/www.hohotint.com\/list-10-1.html (Accessed on 09\/12\/2020)."},{"key":"e_1_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3312837"},{"key":"e_1_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173225.3173234"},{"key":"e_1_2_2_25_1","volume-title":"Henry WW Potts, and Jane Wardle.","author":"Lally Phillippa","year":"2010","unstructured":"Phillippa Lally , Cornelia HM Van Jaarsveld , Henry WW Potts, and Jane Wardle. 2010 . How are habits formed: Modelling habit formation in the real world. European journal of social psychology 40, 6 (2010), 998--1009. Phillippa Lally, Cornelia HM Van Jaarsveld, Henry WW Potts, and Jane Wardle. 2010. How are habits formed: Modelling habit formation in the real world. European journal of social psychology 40, 6 (2010), 998--1009."},{"key":"e_1_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2004.17"},{"key":"e_1_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173754"},{"key":"e_1_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.14722\/eurousec.2016.23014"},{"key":"e_1_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcip.2010.10.002"},{"key":"e_1_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3322276.3322337"},{"key":"e_1_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tsf.2008.11.115"},{"key":"e_1_2_2_32_1","volume-title":"Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. 1649--1658","author":"Portnoff Rebecca S","year":"2015","unstructured":"Rebecca S Portnoff , Linda N Lee , Serge Egelman , Pratyush Mishra , Derek Leung , and David Wagner . 2015 . Somebody's watching me? assessing the effectiveness of webcam indicator lights . In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. 1649--1658 . Rebecca S Portnoff, Linda N Lee, Serge Egelman, Pratyush Mishra, Derek Leung, and David Wagner. 2015. Somebody's watching me? assessing the effectiveness of webcam indicator lights. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. 1649--1658."},{"key":"e_1_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493988.2494331"},{"key":"e_1_2_2_34_1","unstructured":"Sam Rutherford. 2020. Apple Warns Against Closing Your Laptop While Using a Webcam Cover. https:\/\/www.gizmodo.co.uk\/2020\/07\/apple-warns-against-closing-your-laptop-while-using-a-webcam-cover\/ (Accessed on 09\/08\/2020).  Sam Rutherford. 2020. Apple Warns Against Closing Your Laptop While Using a Webcam Cover. https:\/\/www.gizmodo.co.uk\/2020\/07\/apple-warns-against-closing-your-laptop-while-using-a-webcam-cover\/ (Accessed on 09\/08\/2020)."},{"key":"e_1_2_2_35_1","unstructured":"Marc Saltzman. 2020. Webcams are infiltrating your home. Here's how to secure those on your computers. https:\/\/www.usatoday.com\/story\/tech\/columnist\/2020\/02\/15\/webcam-security-heres-some-simple-tips-protect-your-privacy\/4749529002\/  Marc Saltzman. 2020. Webcams are infiltrating your home. Here's how to secure those on your computers. https:\/\/www.usatoday.com\/story\/tech\/columnist\/2020\/02\/15\/webcam-security-heres-some-simple-tips-protect-your-privacy\/4749529002\/"},{"key":"e_1_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.35"},{"key":"e_1_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1037\/e578132012-011"},{"key":"e_1_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/40.946681"},{"key":"e_1_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/40.946683"},{"key":"e_1_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702230"},{"key":"e_1_2_2_41_1","volume-title":"Crying Wolf: An Empirical Study of SSL Warning Effectiveness.. In USENIX security symposium. Montreal, Canada, 399--416.","author":"Sunshine Joshua","year":"2009","unstructured":"Joshua Sunshine , Serge Egelman , Hazim Almuhimedi , Neha Atri , and Lorrie Faith Cranor . 2009 . Crying Wolf: An Empirical Study of SSL Warning Effectiveness.. In USENIX security symposium. Montreal, Canada, 399--416. Joshua Sunshine, Serge Egelman, Hazim Almuhimedi, Neha Atri, and Lorrie Faith Cranor. 2009. Crying Wolf: An Empirical Study of SSL Warning Effectiveness.. In USENIX security symposium. Montreal, Canada, 399--416."},{"key":"e_1_2_2_42_1","volume-title":"Fifteenth Symposium on Usable Privacy and Security ({SOUPS}","author":"Tabassum Madiha","year":"2019","unstructured":"Madiha Tabassum , Tomasz Kosinski , and Heather Richter Lipford . 2019 . \" I don't own the data\": End User Perceptions of Smart Home Device Data Practices and Risks . In Fifteenth Symposium on Usable Privacy and Security ({SOUPS} 2019). Madiha Tabassum, Tomasz Kosinski, and Heather Richter Lipford. 2019. \" I don't own the data\": End User Perceptions of Smart Home Device Data Practices and Risks. In Fifteenth Symposium on Usable Privacy and Security ({SOUPS} 2019)."},{"key":"e_1_2_2_43_1","volume-title":"FBI's search for 'Mo,' suspect in bomb threats, highlights use of malware for surveillance. The Washington Post (Dec","author":"Timberg Craig","year":"2013","unstructured":"Craig Timberg and Ellen Nakashima . 2013. FBI's search for 'Mo,' suspect in bomb threats, highlights use of malware for surveillance. The Washington Post (Dec 2013 ). https:\/\/www.washingtonpost.com\/business\/technology\/2013\/12\/06\/352ba174-5397-11e3-9e2c-e1d01116fd98_story.html Craig Timberg and Ellen Nakashima. 2013. FBI's search for 'Mo,' suspect in bomb threats, highlights use of malware for surveillance. The Washington Post (Dec 2013). https:\/\/www.washingtonpost.com\/business\/technology\/2013\/12\/06\/352ba174-5397-11e3-9e2c-e1d01116fd98_story.html"},{"key":"e_1_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/11551201_5"},{"key":"e_1_2_2_45_1","unstructured":"Kurt Wagner. 2020. Facebook Shared User Data With Developers Longer Than Promised. https:\/\/www.bloomberg.com\/news\/articles\/2020-07-01\/facebook-shared-user-data-with-developers-longer-than-promised  Kurt Wagner. 2020. Facebook Shared User Data With Developers Longer Than Promised. https:\/\/www.bloomberg.com\/news\/articles\/2020-07-01\/facebook-shared-user-data-with-developers-longer-than-promised"},{"key":"e_1_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174143"},{"key":"e_1_2_2_47_1","unstructured":"Huiying Yan. 2020. Memory Bookmarking: Using In Situ Information to Promote Recall in Online Data Collection. Ph.D. Dissertation.  Huiying Yan. 2020. Memory Bookmarking: Using In Situ Information to Promote Recall in Online Data Collection. Ph.D. Dissertation."},{"key":"e_1_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501988.2502037"},{"key":"e_1_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300428"}],"container-title":["Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3494983","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3494983","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3494983","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:18:59Z","timestamp":1750191539000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3494983"}},"subtitle":["Exploring the Design of an Intelligent Webcam Cover to Improve Usability and Trust"],"short-title":[],"issued":{"date-parts":[[2021,12,27]]},"references-count":49,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,12,27]]}},"alternative-id":["10.1145\/3494983"],"URL":"https:\/\/doi.org\/10.1145\/3494983","relation":{},"ISSN":["2474-9567"],"issn-type":[{"value":"2474-9567","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12,27]]},"assertion":[{"value":"2021-12-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}