{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,8]],"date-time":"2026-05-08T21:26:26Z","timestamp":1778275586543,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":58,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,11]],"date-time":"2024-05-11T00:00:00Z","timestamp":1715385600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,11]]},"DOI":"10.1145\/3613904.3642242","type":"proceedings-article","created":{"date-parts":[[2024,5,11]],"date-time":"2024-05-11T08:38:25Z","timestamp":1715416705000},"page":"1-18","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":27,"title":["In Focus, Out of Privacy: The Wearer's Perspective on the Privacy Dilemma of Camera Glasses"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-5254-3296","authenticated-orcid":false,"given":"Divyanshu","family":"Bhardwaj","sequence":"first","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Germany and Saarland University, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6119-9701","authenticated-orcid":false,"given":"Alexander","family":"Ponticello","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Germany and Saarland University, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-9268-1820","authenticated-orcid":false,"given":"Shreya","family":"Tomar","sequence":"additional","affiliation":[{"name":"Indraprastha Institute of Information Technology, Delhi, India"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0340-6204","authenticated-orcid":false,"given":"Adrian","family":"Dabrowski","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2425-3013","authenticated-orcid":false,"given":"Katharina","family":"Krombholz","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2024,5,11]]},"reference":[{"key":"e_1_3_3_3_1_1","unstructured":"2021. Ray-Ban and Facebook Introduce Ray-Ban Stories First-Generation Smart Glasses. Retrieved 2023-09-12 from https:\/\/tech.facebook.com\/reality-labs\/2021\/9\/ray-ban-and-facebook-introduce-ray-ban-stories-first-generation-smart-glasses\/"},{"key":"e_1_3_3_3_2_1","unstructured":"2023. Facebook View. Retrieved 2023-09-12 from https:\/\/apps.apple.com\/us\/app\/facebook-view\/id1558240027"},{"key":"e_1_3_3_3_3_1","unstructured":"2023. Facebook View - Apps on Google Play. Retrieved 2023-09-12 from https:\/\/play.google.com\/store\/apps\/details?id=com.facebook.stella&hl=en"},{"key":"e_1_3_3_3_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21827-9_52"},{"key":"e_1_3_3_3_5_1","volume-title":"Are the EU GDPR and the California CCPA Becoming the de Facto Global Standards for Data Privacy and Protection?Scitech Lawyer 15, 3","author":"Barrett Catherine","year":"2019","unstructured":"Catherine Barrett. 2019. Are the EU GDPR and the California CCPA Becoming the de Facto Global Standards for Data Privacy and Protection?Scitech Lawyer 15, 3 (2019), 24\u201329."},{"key":"e_1_3_3_3_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300651"},{"key":"e_1_3_3_3_7_1","volume-title":"Using Thematic Analysis in Psychology. Qualitative research in psychology 3, 2","author":"Braun Virginia","year":"2006","unstructured":"Virginia Braun and Victoria Clarke. 2006. Using Thematic Analysis in Psychology. Qualitative research in psychology 3, 2 (2006), 77\u2013101."},{"key":"e_1_3_3_3_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1054972.1055098"},{"key":"e_1_3_3_3_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376304"},{"key":"e_1_3_3_3_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3563657.3595967"},{"key":"e_1_3_3_3_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26762-3_21"},{"key":"e_1_3_3_3_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SMC.2013.83"},{"key":"e_1_3_3_3_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-63086-7_22"},{"key":"e_1_3_3_3_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557352"},{"key":"e_1_3_3_3_15_1","first-page":"2","article-title":"The Social Construction of a Glasshole: Google Glass and Multiactivity in Social Interaction.","volume":"13","author":"Due L.","year":"2015","unstructured":"Brian\u00a0L. Due. 2015. The Social Construction of a Glasshole: Google Glass and Multiactivity in Social Interaction.PsychNology Journal 13, 2-3 (2015).","journal-title":"PsychNology Journal"},{"key":"e_1_3_3_3_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702251"},{"key":"e_1_3_3_3_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2807442.2807449"},{"key":"e_1_3_3_3_18_1","doi-asserted-by":"publisher","DOI":"10.1086\/209351"},{"key":"e_1_3_3_3_19_1","unstructured":"International\u00a0Organization for Standardization\u00a0(ISO). 2011. ISO 7010 - Graphical symbols - Safety colours and safety signs - Registered safety signs - P044. Retrieved 2023-09-12 from https:\/\/www.iso.org\/obp\/ui##iso:grs:7010:P044"},{"key":"e_1_3_3_3_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.technovation.2019.05.006"},{"key":"e_1_3_3_3_21_1","volume-title":"Google launches competition to pick \u2018Glass Explorers","author":"Gabbatt Adam","year":"2023","unstructured":"Adam Gabbatt. 2013. Google launches competition to pick \u2018Glass Explorers\u2019 test group. Retrieved 2023-09-12 from https:\/\/www.theguardian.com\/technology\/2013\/feb\/20\/google-glass-8000-prototypes-online-competition"},{"key":"e_1_3_3_3_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029179.1029183"},{"key":"e_1_3_3_3_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00097"},{"key":"e_1_3_3_3_24_1","doi-asserted-by":"publisher","DOI":"10.1080\/19312450709336664"},{"key":"e_1_3_3_3_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462096.2462113"},{"key":"e_1_3_3_3_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2632048.2632079"},{"key":"e_1_3_3_3_27_1","doi-asserted-by":"publisher","DOI":"10.1037\/13619-016"},{"key":"e_1_3_3_3_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s43681-022-00155-7"},{"key":"e_1_3_3_3_29_1","volume-title":"Proceedings of the 13th International Workshop on Digital-Forensics and Watermarking (IWDW","author":"Jimenez Alberto\u00a0Escalada","year":"2014","unstructured":"Alberto\u00a0Escalada Jimenez, Adrian Dabrowski, Noburu Sonehara, Juan M\u00a0Montero Martinez, and Isao Echizen. 2014. Tag Detection for Preventing Unauthorized Face Image Processing. In Proceedings of the 13th International Workshop on Digital-Forensics and Watermarking (IWDW 2014). LNCS, Springer."},{"key":"e_1_3_3_3_30_1","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Kaur Harjot","year":"2022","unstructured":"Harjot Kaur, Sabrina Amft, Daniel Votipka, Yasemin Acar, and Sascha Fahl. 2022. Where to Recruit for Security Development Studies: Comparing Six Software Developer Samples. In 31st USENIX Security Symposium (USENIX Security 22). USENIX Association, Boston, MA, 4041\u20134058. https:\/\/www.usenix.org\/conference\/usenixsecurity22\/presentation\/kaur"},{"key":"e_1_3_3_3_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098279.3122123"},{"key":"e_1_3_3_3_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785830.2785842"},{"key":"e_1_3_3_3_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173225.3173234"},{"key":"e_1_3_3_3_34_1","doi-asserted-by":"publisher","DOI":"10.1177\/09636625211001555"},{"key":"e_1_3_3_3_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48051-9_20"},{"key":"e_1_3_3_3_36_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2017.23001"},{"key":"e_1_3_3_3_37_1","doi-asserted-by":"publisher","DOI":"10.2307\/2529310"},{"key":"e_1_3_3_3_38_1","doi-asserted-by":"publisher","DOI":"10.1177\/0146167283093007"},{"key":"e_1_3_3_3_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2661334.2661400"},{"key":"e_1_3_3_3_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1026653.1026654"},{"key":"e_1_3_3_3_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclinepi.2013.08.015"},{"key":"e_1_3_3_3_42_1","volume-title":"Diener","author":"Napa\u00a0Scollon Christie","year":"2009","unstructured":"Christie Napa\u00a0Scollon, Chu-Kim Prieto, and Ed Diener. 2009. Experience sampling: promises and pitfalls, strength and weaknesses. In Assessing well-being: the collected works of ED Diener. Springer, 157\u2013180."},{"key":"e_1_3_3_3_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/587078.587092"},{"key":"e_1_3_3_3_44_1","volume-title":"Exploring Authentication for Security-Sensitive Tasks on Smart Home Voice Assistants. In Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021","author":"Ponticello Alexander","year":"2021","unstructured":"Alexander Ponticello, Matthias Fassl, and Katharina Krombholz. 2021. Exploring Authentication for Security-Sensitive Tasks on Smart Home Voice Assistants. In Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021). USENIX Association, 475\u2013492. https:\/\/www.usenix.org\/conference\/soups2021\/presentation\/ponticello"},{"key":"e_1_3_3_3_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702164"},{"key":"e_1_3_3_3_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2639108.2639126"},{"key":"e_1_3_3_3_47_1","doi-asserted-by":"publisher","unstructured":"Philipp\u00a0A. Rauschnabel Alexander Brem and Bjoern\u00a0S. Ivens. 2015. Who Will Buy Smart Glasses? Empirical Results of Two Pre-Market-Entry Studies on the Role of Personality in Individual Awareness and Intended Adoption of Google Glass Wearables. Computers in Human Behavior 49 (Aug. 2015) 635\u2013647. https:\/\/doi.org\/10.1016\/j.chb.2015.03.003","DOI":"10.1016\/j.chb.2015.03.003"},{"key":"e_1_3_3_3_48_1","volume-title":"Fight Fire with Fire: Hacktivists\u2019 Take on Social Media Misinformation. In Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023","author":"Sharevski Filipo","year":"2023","unstructured":"Filipo Sharevski and Benjamin Kessell. 2023. Fight Fire with Fire: Hacktivists\u2019 Take on Social Media Misinformation. In Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023). USENIX Association, Anaheim, CA, 19\u201336. https:\/\/www.usenix.org\/conference\/soups2023\/presentation\/sharevski"},{"key":"e_1_3_3_3_49_1","doi-asserted-by":"publisher","DOI":"10.1177\/0894439316650163"},{"key":"e_1_3_3_3_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851581.2892522"},{"key":"e_1_3_3_3_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314111.3319913"},{"key":"e_1_3_3_3_52_1","unstructured":"RAY-BAN STORE. [n.d.]. Ray-Ban Stories FAQ. Retrieved 2023-09-12 from https:\/\/www.ray-ban.com\/usa\/c\/frequently-asked-questions-ray-ban-stories"},{"key":"e_1_3_3_3_53_1","doi-asserted-by":"publisher","DOI":"10.13140\/RG.2.2.25818.95684"},{"key":"e_1_3_3_3_54_1","unstructured":"Hayley Tsukayama. 2014. Anti-Google Glass attack in San Francisco highlights tension over wearables. Retrieved 2023-09-12 from https:\/\/www.washingtonpost.com\/business\/technology\/anti-glass-attack-in-san-francisco-highlights-tension-over-wearables\/2014\/02\/26\/b3f21e44-9eeb-11e3-9ba6-800d1192d08b_story.html"},{"key":"e_1_3_3_3_55_1","first-page":"40","article-title":"Faking It: Social Desirability Response Bias in Self-Report Research","volume":"25","author":"van de Mortel F.","year":"2008","unstructured":"Thea\u00a0F. van de Mortel. 2008. Faking It: Social Desirability Response Bias in Self-Report Research. Australian Journal of Advanced Nursing 25, 4 (2008), 40\u201348.","journal-title":"Australian Journal of Advanced Nursing"},{"key":"e_1_3_3_3_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2014.53"},{"key":"e_1_3_3_3_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2639108.2639119"},{"key":"e_1_3_3_3_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560571"}],"event":{"name":"CHI '24: CHI Conference on Human Factors in Computing Systems","location":"Honolulu HI USA","acronym":"CHI '24","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction","SIGACCESS ACM Special Interest Group on Accessible Computing"]},"container-title":["Proceedings of the CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3613904.3642242","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3613904.3642242","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:44:24Z","timestamp":1750290264000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3613904.3642242"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,11]]},"references-count":58,"alternative-id":["10.1145\/3613904.3642242","10.1145\/3613904"],"URL":"https:\/\/doi.org\/10.1145\/3613904.3642242","relation":{},"subject":[],"published":{"date-parts":[[2024,5,11]]},"assertion":[{"value":"2024-05-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}