{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T15:55:23Z","timestamp":1770825323090,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":81,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T00:00:00Z","timestamp":1745539200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,4,26]]},"DOI":"10.1145\/3706598.3714306","type":"proceedings-article","created":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T04:45:58Z","timestamp":1745469958000},"page":"1-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Trusting Tracking: Perceptions of Non-Verbal Communication Tracking in Videoconferencing"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-0185-3360","authenticated-orcid":false,"given":"Carlota","family":"Vazquez Gonzalez","sequence":"first","affiliation":[{"name":"Informatics Department, King's College London, London, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1387-8168","authenticated-orcid":false,"given":"Timothy","family":"Neate","sequence":"additional","affiliation":[{"name":"Department of Informatics, King's College London, London, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2875-6793","authenticated-orcid":false,"given":"Rita","family":"Borgo","sequence":"additional","affiliation":[{"name":"Informatics Department, Kings College London, London, England, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2025,4,25]]},"reference":[{"key":"e_1_3_3_2_2_2","doi-asserted-by":"publisher","unstructured":"Taslima Akter Yoonha Cha Isabela Figueira Stacy\u00a0M. Branham and Anne\u00a0Marie Piper. 2023. \u201cIf I\u2019m supposed to be the facilitator I should be the host\u201d: Understanding the Accessibility of Videoconferencing for Blind and Low Vision Meeting Facilitators. Association for Computing Machinery New York NY USA. 10.1145\/3597638.3608420","DOI":"10.1145\/3597638.3608420"},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"publisher","unstructured":"Joseph\u00a0A. Allen and Nale Lehmann-Willenbrock. 2023. The science of workplace meetings: Integrating findings building new theoretical angles and embracing cross-disciplinary research. Organizational Psychology Review 13 4 (2023) 351\u2013354. 10.1177\/20413866221122896 arXiv:10.1177\/20413866221122896","DOI":"10.1177\/20413866221122896"},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"publisher","unstructured":"Sieun An Li-Jun Ji Michael Marks and Zhiyong Zhang. 2017. Two Sides of Emotion: Exploring Positivity and Negativity in Six Basic Emotions across Cultures. Frontiers in Psychology 8 610 (Apr 2017). 10.3389\/fpsyg.2017.00610","DOI":"10.3389\/fpsyg.2017.00610"},{"key":"e_1_3_3_2_5_2","unstructured":"Theophilus Azungah and Rulinawaty Kasmad. 2020. Qualitative Research Journal Article information: For Authors Qualitative research: deductive and inductive approaches to data analysis. (08 2020)."},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"publisher","unstructured":"Jeremy\u00a0N. Bailenson. 2021. Nonverbal overload: A theoretical argument for the causes of zoom fatigue. Technology Mind and Behavior 2 1 (Feb 2021). 10.1037\/tmb0000030","DOI":"10.1037\/tmb0000030"},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"publisher","unstructured":"Marcel Becker. 2019. Privacy in the digital age: comparing and contrasting individual versus social approaches towards privacy. Ethics and Information Technology 21 (12 2019). 10.1007\/s10676-019-09508-z","DOI":"10.1007\/s10676-019-09508-z"},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"publisher","unstructured":"Eric\u00a0S. Belt and Patrick\u00a0R. Lowenthal. 2022. Synchronous video-based communication and online learning: an exploration of instructors\u2019 perceptions and experiences. Education and Information Technologies 28 4941-4964 (Oct 2022). 10.1007\/s10639-022-11360-6","DOI":"10.1007\/s10639-022-11360-6"},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"publisher","unstructured":"Ivo Benke Maren Schneider Xuanhui Liu and Alexander Maedche. 2022. Teamspiritous - a retrospective emotional competence development system for video-meetings. Proceedings of the ACM on Human-Computer Interaction 6 CSCW2 (2022) 1\u201328. 10.1145\/3555117","DOI":"10.1145\/3555117"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54069-1_5"},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"publisher","unstructured":"David Byrne. 2022. A worked example of Braun and Clarke\u2019s approach to reflexive thematic analysis. Quality & Quantity 56 (06 2022). 10.1007\/s11135-021-01182-y","DOI":"10.1007\/s11135-021-01182-y"},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"publisher","unstructured":"Claude Castelluccia and Daniel Le\u00a0M\u00e9tayer. 2020. Position paper: Analyzing the impacts of\u00a0facial recognition. Privacy Technologies and Policy (2020) 43\u201357. 10.1007\/978-3-030-55196-4_3","DOI":"10.1007\/978-3-030-55196-4_3"},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"publisher","unstructured":"Ann Cavoukian. 2011. Privacy by Design: Origins Meaning and Prospects for Assuring Privacy and Trust in the Information Era. Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards (01 2011) 170\u2013208. 10.4018\/978-1-61350-501-4.ch007","DOI":"10.4018\/978-1-61350-501-4.ch007"},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"publisher","unstructured":"Sadil Chamishka Ishara Madhavi Rashmika Nawaratne Damminda Alahakoon Daswin De\u00a0Silva Naveen Chilamkurti and Vishaka Nanayakkara. 2022. A voice-based real-time emotion detection technique using recurrent neural network empowered feature modelling. Multimedia Tools and Applications 81 24 (Jun 2022) 35173\u201335194. 10.1007\/s11042-022-13363-4","DOI":"10.1007\/s11042-022-13363-4"},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"publisher","unstructured":"Tek\u00a0Raj Chhetri Anelia Kurteva Rance\u00a0J. DeLong Rainer Hilscher Kai Korte and Anna Fensel. 2022. Data Protection by Design Tool for Automated GDPR Compliance Verification Based on Semantically Modeled Informed Consent. Sensors 22 7 (2022). 10.3390\/s22072763","DOI":"10.3390\/s22072763"},{"key":"e_1_3_3_2_16_2","unstructured":"Sheng-Yang Chiu Yu-Ting Huang Chieh-Ting Lin Yu-Chee Tseng Jen-Jee Chen Meng-Hsuan Tu Bo-Chen Tung and YuJou Nieh. 2023. Privacy-Preserving Video Conferencing via Thermal-Generative Images. https:\/\/arxiv.org\/abs\/2303.09279?utm_source=chatgpt.com"},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"publisher","unstructured":"Juliet\u00a0M. Corbin and Anselm Strauss. 1990. Grounded Theory research: Procedures canons and Evaluative Criteria. Qualitative Sociology 13 1 (1990) 3\u201321. 10.1007\/bf00988593","DOI":"10.1007\/bf00988593"},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"crossref","unstructured":"Natasha Dhawan Molly Carnes Angela Byars-Winston and Narjust Duma. 2021. Videoconferencing etiquette: promoting gender equity during virtual meetings. Journal of Women\u2019s Health 30 4 (2021) 460\u2013465.","DOI":"10.1089\/jwh.2020.8881"},{"key":"e_1_3_3_2_19_2","doi-asserted-by":"publisher","unstructured":"Peer Eyal Rothschild David Andrew Gordon Evernden Zak and Ekaterina Damer. 2021. Data quality of platforms and panels for online behavioral research. Behavior Research Methods 54 (09 2021). 10.3758\/s13428-021-01694-3","DOI":"10.3758\/s13428-021-01694-3"},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"publisher","unstructured":"Mohamed Ez-zaouia Aur\u00e9lien Tabard and Elise Lavou\u00e9. 2020. Emodash: A Dashboard supporting retrospective awareness of emotions in online learning. International Journal of Human-Computer Studies 139 (2020) 102411. 10.1016\/j.ijhcs.2020.102411","DOI":"10.1016\/j.ijhcs.2020.102411"},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"publisher","unstructured":"K. Ezzameli and H. Mahersia. 2023. Emotion recognition from unimodal to multimodal analysis: A review. Information Fusion 99 (2023) 101847. 10.1016\/j.inffus.2023.101847","DOI":"10.1016\/j.inffus.2023.101847"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"publisher","unstructured":"Alex Fan Xingshuo Xiao and Peter Washington. 2023. Addressing Racial Bias in Facial Emotion Recognition. 10.48550\/arXiv.2308.04674","DOI":"10.48550\/arXiv.2308.04674"},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"publisher","unstructured":"Heather\u00a0A. Faucett Matthew\u00a0L. Lee and Scott Carter. 2017. I Should Listen More: Real-time Sensing and Feedback of Non-Verbal Communication in Video Telehealth. Proc. ACM Hum.-Comput. Interact. 1 CSCW (dec 2017). 10.1145\/3134679","DOI":"10.1145\/3134679"},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"crossref","unstructured":"Geraldine Fauville Mufan Luo Anna\u00a0Carolina Muller\u00a0Queiroz Jeremy\u00a0N Bailenson and Jeff Hancock. 2021. Nonverbal mechanisms predict zoom fatigue and explain why women experience higher levels than men. Available at SSRN 3820035 (2021).","DOI":"10.2139\/ssrn.3820035"},{"key":"e_1_3_3_2_25_2","doi-asserted-by":"publisher","unstructured":"G. Fauville M. Luo A.C.M. Queiroz A. Lee J.N. Bailenson and J. Hancock. 2023. Video-conferencing usage dynamics and nonverbal mechanisms exacerbate Zoom Fatigue particularly for women. Computers in Human Behavior Reports 10 (2023) 100271. 10.1016\/j.chbr.2023.100271","DOI":"10.1016\/j.chbr.2023.100271"},{"key":"e_1_3_3_2_26_2","doi-asserted-by":"publisher","unstructured":"G\u00e9raldine Fauville Anna C.\u00a0M. Queiroz Mufan Luo Jeffrey Hancock and Jeremy\u00a0N. Bailenson. 2022. Impression formation from video conference screenshots: The role of gaze camera distance and angle. Technology Mind and Behavior 3 1 (Jan 2022). 10.1037\/tmb0000055","DOI":"10.1037\/tmb0000055"},{"key":"e_1_3_3_2_27_2","doi-asserted-by":"publisher","unstructured":"Manabu Fujimoto. 2016. Team Roles and Hierarchic System in Group Discussion. Group Decision and Negotiation 25 (05 2016). 10.1007\/s10726-015-9453-7","DOI":"10.1007\/s10726-015-9453-7"},{"key":"e_1_3_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/AIVR50618.2020.00026"},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"publisher","unstructured":"Thomas Gremsl and Elisabeth H\u00f6dl. 2022. Emotional AI: Legal and ethical challenges. Information Polity 27 (04 2022) 1\u201312. 10.3233\/IP-211529","DOI":"10.3233\/IP-211529"},{"key":"e_1_3_3_2_30_2","doi-asserted-by":"publisher","unstructured":"Simeng Gu Fushun Wang Nitesh\u00a0P. Patel James\u00a0A. Bourgeois and Jason\u00a0H. Huang. 2019. A model for basic emotions using observations of behavior in drosophila. Frontiers in Psychology 10 (Apr 2019). 10.3389\/fpsyg.2019.00781","DOI":"10.3389\/fpsyg.2019.00781"},{"key":"e_1_3_3_2_31_2","doi-asserted-by":"crossref","unstructured":"Greg Guest Emily Namey and Mario Chen. 2020. A Simple Method to Assess and Report Thematic Saturation in Qualitative Research. PLoS One 15 5 (May 2020) 1\u201317. https:\/\/journals.plos.org\/plosone\/article?id=10.1371\/journal.pone.0232076","DOI":"10.1371\/journal.pone.0232076"},{"key":"e_1_3_3_2_32_2","volume-title":"Engineering Privacy by Design","author":"G\u00fcrses Seda","year":"2011","unstructured":"Seda G\u00fcrses, Carmela Troncoso, and Claudia Diaz. 2011. Engineering Privacy by Design. https:\/\/software.imdea.org\/\u00a0carmela.troncoso\/papers\/Gurses-CPDP11.pdf"},{"key":"e_1_3_3_2_33_2","doi-asserted-by":"publisher","unstructured":"Emily Ho David Hagmann and George Loewenstein. 2020. Measuring Information Preferences. Management Science 67 (03 2020). 10.1287\/mnsc.2019.3543","DOI":"10.1287\/mnsc.2019.3543"},{"key":"e_1_3_3_2_34_2","doi-asserted-by":"publisher","unstructured":"Chien-Lung Hsu Yi-Chuan Liao Ching-Wen Lee and Lin\u00a0Kun Chan. 2022. Privacy Concerns and Information Sharing: The Perspective of the U-Shaped Curve. Frontiers in Psychology 13 771278. (May 2022). 10.3389\/fpsyg.2022.771278","DOI":"10.3389\/fpsyg.2022.771278"},{"key":"e_1_3_3_2_35_2","doi-asserted-by":"publisher","unstructured":"Dima Kagan Galit\u00a0Fuhrmann Alpert and Michael Fire. 2024. Zooming Into Video Conferencing Privacy. IEEE Transactions on Computational Social Systems 11 1 (2024) 933\u2013944. 10.1109\/TCSS.2022.3231987","DOI":"10.1109\/TCSS.2022.3231987"},{"key":"e_1_3_3_2_36_2","doi-asserted-by":"publisher","unstructured":"Amelia Katirai. 2023. Ethical considerations in emotion recognition technologies: a review of the literature. AI and ethics (Jun 2023). 10.1007\/s43681-023-00307-3","DOI":"10.1007\/s43681-023-00307-3"},{"key":"e_1_3_3_2_37_2","doi-asserted-by":"publisher","unstructured":"Hiroaki Kawashima Takeshi Nishikawa and Takashi Matsuyama. 2008. Visual filler. CHI \u201908 Extended Abstracts on Human Factors in Computing Systems (Apr 2008). 10.1145\/1358628.1358895","DOI":"10.1145\/1358628.1358895"},{"key":"e_1_3_3_2_38_2","doi-asserted-by":"publisher","unstructured":"Katriina Kilpi Shirley\u00a0A. Elprama and An Jacobs. 2013. Exploring privacy and trust issues in a future immersive videoconferencing system. 2013 46th Hawaii International Conference on System Sciences (Jan 2013). 10.1109\/hicss.2013.220","DOI":"10.1109\/hicss.2013.220"},{"key":"e_1_3_3_2_39_2","volume-title":"Nonverbal communication in human interaction","author":"Knapp Mark\u00a0L.","year":"1978","unstructured":"Mark\u00a0L. Knapp and Mary\u00a0O. Wiemann. 1978. Nonverbal communication in human interaction. Holt, Rinehart and Winston."},{"key":"e_1_3_3_2_40_2","doi-asserted-by":"publisher","unstructured":"Nils Koester Patrick Cichy David Antons and Oliver Salge. 2022. Perceived privacy risk in the Internet of Things: determinants consequences and contingencies in the case of connected cars. Electronic Markets 32 (06 2022) 1\u201323. 10.1007\/s12525-022-00522-6","DOI":"10.1007\/s12525-022-00522-6"},{"key":"e_1_3_3_2_41_2","doi-asserted-by":"publisher","unstructured":"Genia Kostka L\u00e9a Steinacker and Miriam Meckel. 2023. Under big brother\u2019s watchful eye: Cross-country attitudes toward facial recognition technology. Government Information Quarterly 40 1 (Jan 2023) 101761. 10.1016\/j.giq.2022.101761","DOI":"10.1016\/j.giq.2022.101761"},{"key":"e_1_3_3_2_42_2","doi-asserted-by":"publisher","unstructured":"Xiaojun Lai and Pei-Luen Patrick\u00a0Rau. 2021. Has Facial Recognition Technology been misused? A public perception model of facial recognition scenarios. Computers in Human Behavior 124 (Nov 2021) 106894. 10.1016\/j.chb.2021.106894","DOI":"10.1016\/j.chb.2021.106894"},{"key":"e_1_3_3_2_43_2","doi-asserted-by":"publisher","unstructured":"Shanshan Li Liang Guo and Jianya Liu. 2022. Towards East Asian Facial Expression Recognition in the Real World: A New Database and Deep Recognition Baseline. Sensors 22 21 (Oct 2022) 8089. 10.3390\/s22218089","DOI":"10.3390\/s22218089"},{"key":"e_1_3_3_2_44_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445488"},{"key":"e_1_3_3_2_45_2","unstructured":"Kate Moran and Kim Salazar. 2019. Creepiness\u2013convenience tradeoff. https:\/\/www.nngroup.com\/articles\/creepiness\/"},{"key":"e_1_3_3_2_46_2","doi-asserted-by":"publisher","unstructured":"Xiaohui Mu Siying Li and Peng Haipeng. 2020. A Review of Face Recognition Technology. IEEE Access PP (07 2020). 10.1109\/ACCESS.2020.3011028","DOI":"10.1109\/ACCESS.2020.3011028"},{"key":"e_1_3_3_2_47_2","doi-asserted-by":"publisher","unstructured":"Timothy Neate Vasiliki Kladouchou Stephanie Wilson and Shehzmani Shams. 2022. \u201cJust not together\u201d: The experience of videoconferencing for people with aphasia during the COVID-19 pandemic. CHI Conference on Human Factors in Computing Systems (Apr 2022). 10.1145\/3491102.3502017","DOI":"10.1145\/3491102.3502017"},{"key":"e_1_3_3_2_48_2","volume-title":"Nonverbal communication: Where nature meets culture","author":"Olofsdotter Segerstr\u00e4le Ullica\u00a0Christina","year":"2020","unstructured":"Segerstr\u00e4le Ullica\u00a0Christina Olofsdotter and P. Moln\u00e1r. 2020. Nonverbal communication: Where nature meets culture. Routledge."},{"key":"e_1_3_3_2_49_2","unstructured":"Gabriella Pangelinan K.\u00a0S. Krishnapriya V\u00edtor Albiero Grace Bezold Kai Zhang Kushal Vangara Michael\u00a0C. King and K. Bowyer. 2023. Exploring Causes of Demographic Variations In Face Recognition Accuracy. ArXiv abs\/2304.07175 (2023). https:\/\/api.semanticscholar.org\/CorpusID:258170115"},{"key":"e_1_3_3_2_50_2","doi-asserted-by":"publisher","unstructured":"Rog\u00e9rio Rossi Marcos\u00a0Agenor Lazarini and Kechi Hirama. 2022. Systematic Literature Review on the Accuracy of Face Recognition Algorithms. EAI Endorsed Transactions on Internet of Things 8 30 (Sep 2022) e5. 10.4108\/eetiot.v8i30.2346","DOI":"10.4108\/eetiot.v8i30.2346"},{"key":"e_1_3_3_2_51_2","doi-asserted-by":"publisher","unstructured":"Samiha Samrose Daniel McDuff Robert Sim Jina Suh Kael Rowan Javier Hernandez Sean Rintel Kevin Moynihan and Mary Czerwinski. 2021. Meetingcoach: An intelligent dashboard for supporting effective & inclusive meetings. Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems (2021). 10.1145\/3411764.3445615","DOI":"10.1145\/3411764.3445615"},{"key":"e_1_3_3_2_52_2","doi-asserted-by":"publisher","unstructured":"Samiha Samrose Ru Zhao Jeffery White Vivian Li Luis Nova Yichen Lu Mohammad\u00a0Rafayet Ali and Mohammed\u00a0Ehsan Hoque. 2018. Coco. Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies 1 4 (2018) 1\u201324. 10.1145\/3161186","DOI":"10.1145\/3161186"},{"key":"e_1_3_3_2_53_2","doi-asserted-by":"publisher","unstructured":"Benjamin Saunders Julius Sim Tom Kingstone Shula Baker Jackie Waterfield Bernadette Bartlam Heather Burroughs and Clare Jinks. 2018. Saturation in qualitative research: exploring its conceptualization and operationalization. Quality & Quantity 52 (07 2018). 10.1007\/s11135-017-0574-8","DOI":"10.1007\/s11135-017-0574-8"},{"key":"e_1_3_3_2_54_2","doi-asserted-by":"publisher","unstructured":"Andrew\u00a0K. Schnackenberg and Edward\u00a0C. Tomlinson. 2016. Organizational Transparency: A New Perspective on Managing Trust in Organization-Stakeholder Relationships. Journal of Management 42 7 (2016) 1784\u20131810. 10.1177\/0149206314525202","DOI":"10.1177\/0149206314525202"},{"key":"e_1_3_3_2_55_2","doi-asserted-by":"publisher","unstructured":"Eva-Maria Schomakers Chantal Lidynia and Martina Ziefle. 2020. All of me? Users\u2019 preferences for privacy-preserving data markets and the importance of anonymity. Electronic Markets 30 (02 2020). 10.1007\/s12525-020-00404-9","DOI":"10.1007\/s12525-020-00404-9"},{"key":"e_1_3_3_2_56_2","doi-asserted-by":"publisher","unstructured":"\u017divil\u0117 Sederevi\u010di\u016bt\u0117-Pa\u010diauskien\u0117 Ilona Valantinait\u0117 and Vaida Asakaviciute. 2022. \u2018Should I Turn On My Video Camera?\u2019 The Students\u2019 Perceptions of the Use of Video Cameras in Synchronous Distant Learning. Electronics 11 (03 2022) 813. 10.3390\/electronics11050813","DOI":"10.3390\/electronics11050813"},{"key":"e_1_3_3_2_57_2","doi-asserted-by":"publisher","unstructured":"Farida\u00a0Habib Semantha Sami Azam Kheng\u00a0Cher Yeo and Bharanidharan Shanmugam. 2020. A Systematic Literature Review on Privacy by Design in the Healthcare Sector. Electronics 9 (03 2020) 452. 10.3390\/electronics9030452","DOI":"10.3390\/electronics9030452"},{"key":"e_1_3_3_2_58_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW59228.2023.00600"},{"key":"e_1_3_3_2_59_2","doi-asserted-by":"publisher","unstructured":"Kristen\u00a0M. Shockley Allison\u00a0S. Gabriel Daron Robertson Christopher\u00a0C. Rosen Nitya Chawla Mahira\u00a0L. Ganster and Maira\u00a0E. Ezerins. 2021. The fatiguing effects of camera use in virtual meetings: A within-person field experiment. Journal of Applied Psychology 106 8 (Aug 2021) 1137\u20131155. 10.1037\/apl0000948","DOI":"10.1037\/apl0000948"},{"key":"e_1_3_3_2_60_2","doi-asserted-by":"publisher","unstructured":"Alexis Shore. 2022. Talking about facial recognition technology: How framing and context influence privacy concerns and support for prohibitive policy. Telematics and Informatics 70 (May 2022) 101815. 10.1016\/j.tele.2022.101815","DOI":"10.1016\/j.tele.2022.101815"},{"key":"e_1_3_3_2_61_2","doi-asserted-by":"publisher","unstructured":"Pragya Singh Tomar Kirti Mathur and Ugrasen Suman. 2023. Unimodal approaches for emotion recognition: A systematic review. Cognitive Systems Research 77 (2023) 94\u2013109. 10.1016\/j.cogsys.2022.10.012","DOI":"10.1016\/j.cogsys.2022.10.012"},{"key":"e_1_3_3_2_62_2","doi-asserted-by":"publisher","unstructured":"Marcus Smith and Seumas Miller. 2022. The ethical application of biometric facial recognition technology. AI & SOCIETY 37 (03 2022). 10.1007\/s00146-021-01199-9","DOI":"10.1007\/s00146-021-01199-9"},{"key":"e_1_3_3_2_63_2","doi-asserted-by":"publisher","unstructured":"Sarah Spiekermann. 2012. The challenges of privacy by design. Commun. ACM 55 7 (Jul 2012) 38\u201340. 10.1145\/2209249.2209263","DOI":"10.1145\/2209249.2209263"},{"key":"e_1_3_3_2_64_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-35731-2_11"},{"key":"e_1_3_3_2_65_2","doi-asserted-by":"publisher","unstructured":"Nelli\u00a0V. Syreyshchikova Danil\u00a0Yu. Pimenov Tadeusz Mikolajczyk and Liviu Moldovan. 2019. Information Safety Process Development According to ISO 27001 for an Industrial Enterprise. Procedia Manufacturing 32 (2019) 278\u2013285. 10.1016\/j.promfg.2019.02.21512th International Conference Interdisciplinarity in Engineering INTER-ENG 2018 4\u20135 October 2018 Tirgu Mures Romania.","DOI":"10.1016\/j.promfg.2019.02.215"},{"key":"e_1_3_3_2_66_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISMAR52148.2021.00027"},{"key":"e_1_3_3_2_67_2","doi-asserted-by":"publisher","unstructured":"Maria Tomprou Young\u00a0Ji Kim Prerna Chikersal Anita\u00a0Williams Woolley and Laura\u00a0A. Dabbish. 2021. Speaking out of turn: How video conferencing reduces vocal synchrony and collective intelligence. PLOS ONE 16 3 (Mar 2021). 10.1371\/journal.pone.0247655","DOI":"10.1371\/journal.pone.0247655"},{"key":"e_1_3_3_2_68_2","doi-asserted-by":"publisher","unstructured":"Miguel\u00a0Ehecatl Trujillo Gabriel Garc\u00eda-Mireles Erick\u00a0Orlando Matla\u00a0Cruz and Mario Piattini. 2019. A Systematic Mapping Study on Privacy by Design in Software Engineering. CLEI Electronic Journal 22 (04 2019). 10.19153\/cleiej.22.1.4","DOI":"10.19153\/cleiej.22.1.4"},{"key":"e_1_3_3_2_69_2","doi-asserted-by":"publisher","unstructured":"Pagona Tsormpatzoudi Bettina Berendt and Fanny Coudert. 2016. Privacy by Design: From Research and Policy to Practice \u2013 the Challenge of Multi-disciplinarity Vol.\u00a09484. 199\u2013212. 10.1007\/978-3-319-31456-3_12","DOI":"10.1007\/978-3-319-31456-3_12"},{"key":"e_1_3_3_2_70_2","unstructured":"W3C. 2016. Accessibility Usability and Inclusion. https:\/\/www.w3.org\/WAI\/fundamentals\/accessibility-usability-inclusion\/"},{"key":"e_1_3_3_2_71_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-90769-3_9"},{"key":"e_1_3_3_2_72_2","doi-asserted-by":"publisher","unstructured":"Ullrich Wagner Lisa Galli Bj\u00f6rn\u00a0H. Schott Andrew Wold Job van\u00a0der Schalk Antony S.\u00a0R. Manstead Klaus Scherer and Henrik Walter. 2014. Beautiful friendship: Social sharing of emotions improves subjective feelings and activates the neural reward circuitry. Social Cognitive and Affective Neuroscience 10 6 (Oct 2014) 801\u2013808. 10.1093\/scan\/nsu121","DOI":"10.1093\/scan\/nsu121"},{"key":"e_1_3_3_2_73_2","doi-asserted-by":"publisher","unstructured":"Qian Wan and Zhicong Lu. 2024. Investigating VTubing as a Reconstruction of Streamer Self-Presentation: Identity Performance and Gender. Proceedings of the ACM on human-computer interaction 8 CSCW1 (Apr 2024) 1\u201322. 10.1145\/3637357","DOI":"10.1145\/3637357"},{"key":"e_1_3_3_2_74_2","doi-asserted-by":"publisher","unstructured":"Yan Wang Wei Song Wei Tao Antonio Liotta Dawei Yang Xinlei Li Shuyong Gao Yixuan Sun Weifeng Ge Wei Zhang and et al.2022. A systematic review on Affective computing: Emotion models databases and recent advances. Information Fusion 83\u201384 (2022) 19\u201352. 10.1016\/j.inffus.2022.03.009","DOI":"10.1016\/j.inffus.2022.03.009"},{"key":"e_1_3_3_2_75_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-58222-6_2"},{"key":"e_1_3_3_2_76_2","doi-asserted-by":"publisher","unstructured":"Jakob Wirth Christian Maier Sven Laumer and Tim Weitzel. 2019. Perceived information sensitivity and interdependent privacy protection: a quantitative study. Electronic Markets 29 (03 2019). 10.1007\/s12525-019-00335-0","DOI":"10.1007\/s12525-019-00335-0"},{"key":"e_1_3_3_2_77_2","doi-asserted-by":"publisher","unstructured":"Aaron\u00a0Y. Wong Richard\u00a0L. Bryck Ryan\u00a0S. Baker Stephen Hutt and Caitlin Mills. 2023. Using a Webcam Based Eye-tracker to Understand Students\u2019 Thought Patterns and Reading Behaviors in Neurodivergent Classrooms. Association for Computing Machinery New York NY USA. 10.1145\/3576050.3576115","DOI":"10.1145\/3576050.3576115"},{"key":"e_1_3_3_2_78_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445299"},{"key":"e_1_3_3_2_79_2","unstructured":"Yucheng Yang Jack West George\u00a0K Thiruvathukal Neil Klingensmith and Kassem Fawaz. [n. d.]. Are You Really Muted?: A Privacy Analysis of Mute Buttons in Video Conferencing Apps. Proceedings on Privacy Enhancing Technologies 1 ([n. d.]) 21."},{"key":"e_1_3_3_2_80_2","doi-asserted-by":"publisher","DOI":"10.1109\/WACV51458.2022.00326"},{"key":"e_1_3_3_2_81_2","doi-asserted-by":"publisher","unstructured":"Peng Zhang and Maged\u00a0N. Kamel\u00a0Boulos. 2022. Privacy-by-Design Environments for Large-Scale Health Research and Federated Learning from Data. International Journal of Environmental Research and Public Health 19 19 (Sep 2022) 11876. 10.3390\/ijerph191911876","DOI":"10.3390\/ijerph191911876"},{"key":"e_1_3_3_2_82_2","doi-asserted-by":"publisher","unstructured":"Qi Zhou Wannapon Suraworachet and Mutlu Cukurova. 2023. Detecting non-verbal speech and gaze behaviours with multimodal data and computer vision to interpret effective collaborative learning interactions. Education and information technologies 29 1 (Nov 2023) 1071\u20131098. 10.1007\/s10639-023-12315-1","DOI":"10.1007\/s10639-023-12315-1"}],"event":{"name":"CHI 2025: CHI Conference on Human Factors in Computing Systems","location":"Yokohama Japan","acronym":"CHI '25","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2025 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706598.3714306","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3706598.3714306","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T05:39:02Z","timestamp":1751607542000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706598.3714306"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,25]]},"references-count":81,"alternative-id":["10.1145\/3706598.3714306","10.1145\/3706598"],"URL":"https:\/\/doi.org\/10.1145\/3706598.3714306","relation":{},"subject":[],"published":{"date-parts":[[2025,4,25]]},"assertion":[{"value":"2025-04-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}