{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,3]],"date-time":"2026-03-03T00:48:02Z","timestamp":1772498882811,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,9,30]],"date-time":"2024-09-30T00:00:00Z","timestamp":1727654400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,9,30]]},"DOI":"10.1145\/3688459.3688478","type":"proceedings-article","created":{"date-parts":[[2024,11,20]],"date-time":"2024-11-20T08:31:55Z","timestamp":1732091515000},"page":"77-93","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Used, Avoided, Restricted? Perceptions, Behavior, and Changes in Video Conferencing of German-speaking Users During and After the Pandemic"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-6580-8456","authenticated-orcid":false,"given":"Lydia","family":"Weinberger","sequence":"first","affiliation":[{"name":"Friedrich-Alexander-Universit\u00e4t Erlangen-N\u00fcrnberg (FAU), Erlangen, Germany,"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1077-7537","authenticated-orcid":false,"given":"Christian","family":"Eichenm\u00fcller","sequence":"additional","affiliation":[{"name":"Friedrich-Alexander-Universit\u00e4t Erlangen-N\u00fcrnberg (FAU), Erlangen, Germany,"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2433-8551","authenticated-orcid":false,"given":"Freya","family":"Gassmann","sequence":"additional","affiliation":[{"name":"Rheinland-Pf\u00e4lzische Technische Universit\u00e4t Kaiserslautern Landau (RPTU), Kaiserslautern, Germany,"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-1403-432X","authenticated-orcid":false,"given":"Gaston","family":"Pugliese","sequence":"additional","affiliation":[{"name":"Friedrich-Alexander-Universit\u00e4t Erlangen-N\u00fcrnberg (FAU), Erlangen, Germany,"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-7158-0219","authenticated-orcid":false,"given":"Zinaida","family":"Benenson","sequence":"additional","affiliation":[{"name":"Friedrich-Alexander-Universit\u00e4t Erlangen-N\u00fcrnberg (FAU), Erlangen, Germany,"}]}],"member":"320","published-online":{"date-parts":[[2024,11,20]]},"reference":[{"key":"e_1_3_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.65"},{"key":"e_1_3_3_2_3_2","unstructured":"CGTN America. 2022. 2020\u2019s Most Embarrassing Zoom Moments. https:\/\/www.youtube.com\/watch?v=yZpEpNPaxsw [Online; accessed on February 15 2024]."},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"crossref","unstructured":"Sharon Bassan. 2020. Data privacy considerations for telehealth consumers amid COVID-19. Journal of Law and the Biosciences 7 1 (2020) lsaa075.","DOI":"10.1093\/jlb\/lsaa075"},{"key":"e_1_3_3_2_5_2","unstructured":"Patrick Beuth. 2022. Deepfake oder cheap fake? Falscher Klitschko narrt auch Warschaus B\u00fcrgermeister. https:\/\/www.spiegel.de\/netzwelt\/web\/franziska-giffey-und-vitali-klitschko-falscher-klitschko-narrt-auch-warschaus-buergermeister-a-611b49b7-cd53-4266-ad82-e7d0600829ba [Online; accessed on February 15 2024]."},{"key":"e_1_3_3_2_6_2","unstructured":"Josh Blum Simon Booth Oded Gal Maxwell Krohn Julia Len Karan Lyons Antonio Marcedone Mike Maxim Merry\u00a0Ember Mou Jack O\u2019Connor et\u00a0al. 2020. E2e encryption for zoom meetings. Zoom Video Commun. Inc. San Jose CA Tech. Rep. Version 2 1 (2020) 57."},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"crossref","unstructured":"Maty\u00e1\u0161 Boh\u00e1\u010dek and Hany Farid. 2022. Protecting world leaders against deep fakes using facial gestural and vocal mannerisms. Proceedings of the National Academy of Sciences 119 48 (2022) e2216035119.","DOI":"10.1073\/pnas.2216035119"},{"key":"e_1_3_3_2_8_2","unstructured":"Stefan Brink. 2021. Videokonferenzsysteme Hinweise des LfDI zur praktischen Nutzung von Videokonferenzsystemen (VKS). https:\/\/www.baden-wuerttemberg.datenschutz.de\/videokonferenzsysteme\/; [Online; accessed February 15 2024]."},{"key":"e_1_3_3_2_9_2","unstructured":"John Brooke et\u00a0al. 1996. SUS-A quick and dirty usability scale. Usability evaluation in industry 189 194 (1996) 4\u20137."},{"key":"e_1_3_3_2_10_2","unstructured":"Statistisches Bundesamt. 2019. Bildungsstand. https:\/\/www.destatis.de\/DE\/Themen\/Gesellschaft-Umwelt\/Bildung-Forschung-Kultur\/Bildungsstand\/_inhalt.html [Online; accessed on February 15 2024]."},{"key":"e_1_3_3_2_11_2","unstructured":"Cisco. 2022. Webex Meetings Security White Paper. https:\/\/www.cisco.com\/c\/en\/us\/products\/collateral\/conferencing\/webex-meeting-center\/white-paper-c11-737588.html [Online; accessed on February 15 2024]."},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"crossref","unstructured":"Mina Deng Kim Wuyts Riccardo Scandariato Bart Preneel and Wouter Joosen. 2011. A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements. Requirements Engineering 16 1 (2011) 3\u201332.","DOI":"10.1007\/s00766-010-0115-7"},{"key":"e_1_3_3_2_13_2","unstructured":"Der Landesbeauftragte f\u00fcr den Datenschutz und die Informationsfreiheit Baden-W\u00fcrttemberg. 2020. Datenschutzfreundliche technische M\u00f6glichkeiten der Kommunikation. https:\/\/www.baden-wuerttemberg.datenschutz.de\/datenschutzfreundliche-technische-moeglichkeiten-der-kommunikation\/ [Online; accessed February 15 2024]."},{"key":"e_1_3_3_2_14_2","first-page":"695","volume-title":"Seventeenth Symposium on Usable Privacy and Security, SOUPS 2021, August 8-10, 2021","author":"Emami-Naeini Pardis","year":"2021","unstructured":"Pardis Emami-Naeini, Tiona Francisco, Tadayoshi Kohno, and Franziska Roesner. 2021. Understanding Privacy Attitudes and Concerns Towards Remote Communications During the COVID-19 Pandemic. In Seventeenth Symposium on Usable Privacy and Security, SOUPS 2021, August 8-10, 2021, Sonia Chiasson (Ed.). USENIX Association, California, CA, 695\u2013714."},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"crossref","unstructured":"Kraig Finstad. 2010. The usability metric for user experience. Interacting with computers 22 5 (2010) 323\u2013327.","DOI":"10.1016\/j.intcom.2010.04.004"},{"key":"e_1_3_3_2_16_2","unstructured":"FTC. 2020. FTC Requires Zoom to Enhance its Security Practices as Part of Settlement. https:\/\/www.ftc.gov\/news-events\/news\/press-releases\/2020\/11\/ftc-requires-zoom-enhance-its-security-practices-part-settlement [Online; accessed on February 15 2024]."},{"key":"e_1_3_3_2_17_2","unstructured":"Berliner\u00a0Beauftragte f\u00fcr Datenschutz\u00a0und Informationsfreiheit. 2020. Hinweise f\u00fcr Berliner Verantwortliche zu Anbietern von Videokonferenz-Diensten. Version 1.0 vom 3. Juli 2020 15 (2020) 1\u201315. https:\/\/www.datarea.de\/berliner-datenschutzbeauftragte-aktualisiert-hinweise-zu-anbietern-von-videokonferenzdiensten\/ [Online; accessed on February 15 2024]."},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"crossref","unstructured":"Rainer\u00a0W Gerling Sebastian Gerling Stefan Hessel and Ronald Petrlic. 2020. Stand der Technik bei Videokonferenzen \u2013 und die Interpretation der Aufsichtsbeh\u00f6rden: \"Naming and shaming\" beim Datenschutz. Datenschutz und Datensicherheit-DuD 44 (2020) 740\u2013747.","DOI":"10.1007\/s11623-020-1359-0"},{"key":"e_1_3_3_2_19_2","unstructured":"GoTo. 2024. How do I create an end-to-end encrypted session?https:\/\/support.goto.com\/meeting\/help\/how-do-i-create-an-end-to-end-encrypted-session [Online; accessed on February 15 2024]."},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC49032.2021.9369505"},{"key":"e_1_3_3_2_21_2","unstructured":"Michael Howard and Steve Lipner. 2006. The Security Development Lifecycle."},{"key":"e_1_3_3_2_22_2","unstructured":"Adi Ikan Liri Porat and Ori Hamama. 2020. Fixing the Zoom \u2018Vanity Clause\u2019 \u2013 Check Point and Zoom collaborate to fix Vanity URL issue. https:\/\/blog.checkpoint.com\/security\/fixing-the-zoom-vanity-clause-check-point-and-zoom-collaborate-to-fix-vanity-url-issue\/ [Online; accessed February 15 2024]."},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"crossref","unstructured":"Balu\u00a0N. Ilag. 2021. Tools and technology for effective remote work. International Journal of Computer Applications 174 21 (2021) 13\u201316.","DOI":"10.5120\/ijca2021921109"},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"crossref","unstructured":"Dima Kagan Galit\u00a0Fuhrmann Alpert and Michael Fire. 2023. Zooming into video conferencing privacy. IEEE Transactions on Computational Social Systems 11 1 (2023) 933\u2013944.","DOI":"10.1109\/TCSS.2022.3231987"},{"key":"e_1_3_3_2_25_2","first-page":"39","volume-title":"Eleventh Symposium on Usable Privacy and Security (SOUPS 2015)","author":"Kang Ruogu","year":"2015","unstructured":"Ruogu Kang, Laura Dabbish, Nathaniel Fruchter, and Sara Kiesler. 2015. \u201cMy Data Just Goes Everywhere: User Mental Models of the Internet and Implications for Privacy and Security. In Eleventh Symposium on Usable Privacy and Security (SOUPS 2015). USENIX, Ottawa, Canada, 39\u201352."},{"key":"e_1_3_3_2_26_2","unstructured":"Konferenz der unabh\u00e4ngigen Datenschutzaufsichtsbeh\u00f6rden des Bundes und der L\u00e4nder (DSK). 2020. Orientierungshilfe Videokonferenzsysteme. https:\/\/www.datenschutzkonferenz-online.de\/media\/oh\/20201023_oh_videokonferenzsysteme.pdf [Online; accessed on February 15 2024]."},{"key":"e_1_3_3_2_27_2","unstructured":"Tiffany\u00a0C Li. 2020. Privacy in pandemic: law technology and public health in the COVID-19 crisis. Loy. U. Chi. LJ 52 (2020) 767."},{"key":"e_1_3_3_2_28_2","unstructured":"Robertas Maleckas Kenneth\u00a0G Paterson and Martin\u00a0R Albrecht. 2023. Practically-exploitable Vulnerabilities in the Jitsi Video Conferencing System."},{"key":"e_1_3_3_2_29_2","unstructured":"Microsoft. 2024. Use end-to-end encryption for Microsoft Teams calls. https:\/\/support.microsoft.com\/en-us\/office\/use-end-to-end-encryption-for-microsoft-teams-calls-1274b4d2-b5c5-4b24-a376-606fa6728a90 [Online; accessed on February 15 2024]."},{"key":"e_1_3_3_2_30_2","unstructured":"Carrie Mihalcik. 2020. Microsoft listened to Skype calls with \u2018no security\u2019 to protect recordings. https:\/\/www.cnet.com\/news\/privacy\/microsoft-listened-to-skype-calls-with-no-security-to-protect-recordings-report-says\/ [Online; accessed on January 10 2022]."},{"key":"e_1_3_3_2_31_2","unstructured":"R. Mir and G. Gebhart. 2020. Harden Your Zoom Settings to Protect Your Privacy and Avoid Trolls. https:\/\/www.eff.org\/deeplinks\/2020\/04\/harden-your-zoom-settings-protect-your-privacy-and-avoid-trolls [Online; accessed on February 15 2024]."},{"key":"e_1_3_3_2_32_2","unstructured":"Sara Morrison and Rebecca Heilweil. 2020. How teachers are sacrificing student privacy to stop cheating. https:\/\/www.vox.com\/recode\/22175021\/school-cheating-student-privacy-remote-learning [Online; accessed on February 15 2024]."},{"key":"e_1_3_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/MMSP53017.2021.9733503"},{"key":"e_1_3_3_2_34_2","unstructured":"NIST. 2020. CVE-2020-11878 Detail. https:\/\/www.cve.org\/CVERecord?id=CVE-2020-11878 [Online; accessed on February 15 2024]."},{"key":"e_1_3_3_2_35_2","unstructured":"NIST. 2022. CVE-2022-28756 Detail. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-28756 [Online; accessed on February 15 2024]."},{"key":"e_1_3_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1145\/3568444.3568468"},{"key":"e_1_3_3_2_37_2","doi-asserted-by":"crossref","unstructured":"Dieter Rasch Klaus\u00a0D Kubinger and Karl Moder. 2011. The two-sample t test: pre-testing its assumptions does not pay off. Statistical papers 52 (2011) 219\u2013231.","DOI":"10.1007\/s00362-009-0224-x"},{"key":"e_1_3_3_2_38_2","doi-asserted-by":"crossref","unstructured":"Thomas Reisinger Isabel Wagner and Eerke\u00a0Albert Boiten. 2022. Security and privacy in unified communication. ACM Computing Surveys (CSUR) 55 3 (2022) 1\u201336.","DOI":"10.1145\/3498335"},{"key":"e_1_3_3_2_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW59978.2023.00021"},{"key":"e_1_3_3_2_40_2","first-page":"244","volume-title":"14th International Symposium on Privacy Enhancing Technologies-PETS 2014","author":"Renaud Karen","year":"2014","unstructured":"Karen Renaud, Melanie Volkamer, Arne Renkema-Padmos, Emiliano De\u00a0Cristofaro, and Steven\u00a0J Murdoch. 2014. Why doesn\u2019t Jane protect her privacy?. In 14th International Symposium on Privacy Enhancing Technologies-PETS 2014. Springer, Amsterdam, The Netherlands, 244\u2013262."},{"key":"e_1_3_3_2_41_2","doi-asserted-by":"crossref","unstructured":"Ramandeep\u00a0Kaur Sandhu Jo\u00e3o Vasconcelos-Gomes Manoj\u00a0A Thomas and Tiago Oliveira. 2023. Unfolding the popularity of video conferencing apps\u2013A privacy calculus perspective. International Journal of Information Management 68 (2023) 102569.","DOI":"10.1016\/j.ijinfomgt.2022.102569"},{"key":"e_1_3_3_2_42_2","doi-asserted-by":"crossref","unstructured":"Marwin Schmitt Judith Redi Dick Bulterman and Pablo\u00a0S Cesar. 2017. Towards individual QoE for multiparty videoconferencing. IEEE Transactions on Multimedia 20 7 (2017) 1781\u20131795.","DOI":"10.1109\/TMM.2017.2777466"},{"key":"e_1_3_3_2_43_2","unstructured":"Adam Shostack. 2014. Threat Modeling: Designing for Security."},{"key":"e_1_3_3_2_44_2","unstructured":"Statista. 2022. Bev\u00f6lkerung nach relevanten Altersgruppen 2021. https:\/\/de.statista.com\/statistik\/daten\/studie\/1365\/ [Online; accessed on February 14 2024]."},{"key":"e_1_3_3_2_45_2","unstructured":"Prolific Team. 2023. What are the advantages and limitations of an online sample?https:\/\/researcher-help.prolific.com\/hc\/en-gb\/articles\/360009501473-What-are-the-advantages-and-limitations-of-an-online-sample [Online; accessed on May 15 2024]."},{"key":"e_1_3_3_2_46_2","unstructured":"Los\u00a0Angeles Times. 2020. Coronavirus social distancing around the world. https:\/\/www.latimes.com\/world-nation\/story\/2020-04-06\/coronavi-social-distancing-around-the-world [Online; accessed on February 15 2024]."},{"key":"e_1_3_3_2_47_2","doi-asserted-by":"crossref","unstructured":"Jan Tolsdorf Florian Dehling Delphine Reinhardt and Luigi Lo\u00a0Iacono. 2021. Exploring mental models of the right to informational self-determination of office workers in Germany. Proceedings on Privacy Enhancing Technologies 2021 3 (2021) 5\u201327.","DOI":"10.2478\/popets-2021-0035"},{"key":"e_1_3_3_2_48_2","unstructured":"Victoria Turk. 2020. Zoom took over the world. This is what will happen next. https:\/\/www.wired.co.uk\/article\/future-of-zoom [Online; accessed on February 15 2024]."},{"key":"e_1_3_3_2_49_2","unstructured":"O. Vegeris. 2020. \"Important Spoofing\"- zero-click wormable cross-platform remote code execution in Microsoft Teams. https:\/\/github.com\/oskarsve\/ms-teams-rce https:\/\/github.com\/oskarsve\/ms-teams-rce [Online; accessed on February 15 2024]."},{"key":"e_1_3_3_2_50_2","unstructured":"Cody Venzke. 2020. For remote learning privacy challenges go beyond zoombombing. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-28756 [Online; accessed on February 15 2024]."},{"key":"e_1_3_3_2_51_2","unstructured":"Business Wire. 2021. Worldwide Unified Communications & Collaboration (UC & C) market soars in 2020 according to IDC. https:\/\/www.businesswire.com\/news\/home\/20210329005600\/en [Online; accessed on February 15 2024]."},{"key":"e_1_3_3_2_52_2","doi-asserted-by":"crossref","unstructured":"Yucheng Yang Jack West George\u00a0K. Thiruvathukal Neil Klingensmith and Kassem Fawaz. 2022. Are You Really Muted?: A Privacy Analysis of Mute Buttons in Video Conferencing Apps. Proc. Priv. Enhancing Technol. 2022 3 (2022) 373\u2013393.","DOI":"10.56553\/popets-2022-0077"},{"key":"e_1_3_3_2_53_2","unstructured":"Eric\u00a0S. Yuan. 2020. Zoom Blog: A Message to Our Users. https:\/\/blog.zoom.us\/a-message-to-our-users\/ [Online; accessed on February 15 2024]."},{"key":"e_1_3_3_2_54_2","unstructured":"Eric\u00a0S. Yuan. 2020. Zoom\u2019s Use of Facebook\u2019s SDK in iOS Client. https:\/\/blog.zoom.us\/zoom-use-of-facebook-sdk-in-ios-client\/ [Online; accessed on February 15 2024]."},{"key":"e_1_3_3_2_55_2","unstructured":"Zoom. 2024. Setting up advanced chat encryption. https:\/\/support.zoom.com\/hc\/en\/article?id=zm_kb&sysparm_article=KB0065662 [Online; accessed on February 15 2024]."}],"event":{"name":"EuroUSEC 2024: The 2024 European Symposium on Usable Security","location":"Karlstad Sweden","acronym":"EuroUSEC 2024"},"container-title":["Proceedings of the 2024 European Symposium on Usable Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3688459.3688478","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3688459.3688478","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:10:30Z","timestamp":1750295430000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3688459.3688478"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,30]]},"references-count":54,"alternative-id":["10.1145\/3688459.3688478","10.1145\/3688459"],"URL":"https:\/\/doi.org\/10.1145\/3688459.3688478","relation":{},"subject":[],"published":{"date-parts":[[2024,9,30]]},"assertion":[{"value":"2024-11-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}