{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T08:01:45Z","timestamp":1776931305157,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":68,"publisher":"ACM","funder":[{"name":"Deutsche Forschungsgemeinschaft (DFG)","award":["521601028"],"award-info":[{"award-number":["521601028"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2026,4,13]]},"DOI":"10.1145\/3772318.3790403","type":"proceedings-article","created":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T04:12:36Z","timestamp":1776053556000},"page":"1-20","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Privacy &amp; Safety Challenges of On-Body Interaction Techniques"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7423-098X","authenticated-orcid":false,"given":"Da\u00f1iel","family":"Gerhardt","sequence":"first","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-5254-3296","authenticated-orcid":false,"given":"Divyanshu","family":"Bhardwaj","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1430-8770","authenticated-orcid":false,"given":"Ashwin","family":"Ram","sequence":"additional","affiliation":[{"name":"Saarland University, Saarland Informatics Campus, Saarbr\u00fccken, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3386-1635","authenticated-orcid":false,"given":"Andr\u00e9","family":"Zenner","sequence":"additional","affiliation":[{"name":"Saarland University, Saarland Informatics Campus, Saarbr\u00fccken, Germany and German Research Center for Artificial Intelligence (DFKI), Saarland Informatics Campus, Saarbr\u00fccken, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3493-8745","authenticated-orcid":false,"given":"J\u00fcrgen","family":"Steimle","sequence":"additional","affiliation":[{"name":"Saarland University, Saarland Informatics Campus, Saarbr\u00fccken, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2425-3013","authenticated-orcid":false,"given":"Katharina","family":"Krombholz","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2026,4,13]]},"reference":[{"key":"e_1_3_3_3_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/3546155.3546691"},{"key":"e_1_3_3_3_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208575"},{"key":"e_1_3_3_3_4_2","doi-asserted-by":"crossref","unstructured":"Rosaline\u00a0S. Barbour. 2001. Checklists for Improving Rigour in Qualitative Research: A Case of the Tail Wagging the Dog? The BMJ 322 7294 (2001).","DOI":"10.1136\/bmj.322.7294.1115"},{"key":"e_1_3_3_3_5_2","doi-asserted-by":"publisher","unstructured":"Katharina-Maria Behr Andreas Nosper Christoph Klimmt and Tilo Hartmann. 2005. Some Practical Considerations of Ethical Issues in VR Research. Presence: Teleoper. Virtual Environ. 14 6 (Dec. 2005). 10.1162\/105474605775196535","DOI":"10.1162\/105474605775196535"},{"key":"e_1_3_3_3_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642242"},{"key":"e_1_3_3_3_7_2","doi-asserted-by":"crossref","unstructured":"Virginia Braun and Victoria Clarke. 2006. Using Thematic Analysis in Psychology. Qualitative Research in Psychology 3 2 (2006).","DOI":"10.1191\/1478088706qp063oa"},{"key":"e_1_3_3_3_8_2","doi-asserted-by":"publisher","unstructured":"Jeff\u00a0K. Caird Kate\u00a0A. Johnston Chelsea\u00a0R. Willness Mark Asbridge and Piers Steel. 2014. A Meta-Analysis of the Effects of Texting on Driving. Accident Analysis & Prevention 71 (Oct. 2014). 10.1016\/j.aap.2014.06.005","DOI":"10.1016\/j.aap.2014.06.005"},{"key":"e_1_3_3_3_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335358"},{"key":"e_1_3_3_3_10_2","doi-asserted-by":"publisher","DOI":"10.1145\/3581791.3596830"},{"key":"e_1_3_3_3_11_2","doi-asserted-by":"publisher","DOI":"10.1145\/1152215.1152261"},{"key":"e_1_3_3_3_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2018.8622110"},{"key":"e_1_3_3_3_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173894"},{"key":"e_1_3_3_3_14_2","doi-asserted-by":"publisher","DOI":"10.1145\/3582700.3582716"},{"key":"e_1_3_3_3_15_2","doi-asserted-by":"publisher","unstructured":"Paula Delgado-Santos Giuseppe Stragapede Ruben Tolosana Richard Guest Farzin Deravi and Ruben Vera-Rodriguez. 2022. A Survey of Privacy Vulnerabilities of Mobile Device Sensors. ACM Comput. Surv. 54 11s (Sept. 2022). 10.1145\/3510579","DOI":"10.1145\/3510579"},{"key":"e_1_3_3_3_16_2","doi-asserted-by":"publisher","unstructured":"Biruk Demissie Eniyew\u00a0Tegegne Bayih and Alelign\u00a0Alemu Demmelash. 2024. A Systematic Review of Work-Related Musculoskeletal Disorders and Risk Factors among Computer Users. Heliyon 10 3 (Feb. 2024). 10.1016\/j.heliyon.2024.e25075","DOI":"10.1016\/j.heliyon.2024.e25075"},{"key":"e_1_3_3_3_17_2","unstructured":"Brian\u00a0L. Due. 2015. The Social Construction of a Glasshole: Google Glass and Multiactivity in Social Interaction. PsychNology Journal 13 2 (Dec. 2015)."},{"key":"e_1_3_3_3_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025636"},{"key":"e_1_3_3_3_19_2","doi-asserted-by":"publisher","unstructured":"Nina Gerber Paul Gerber and Melanie Volkamer. 2018. Explaining the Privacy Paradox: A Systematic Review of Literature Investigating Privacy Attitude and Behavior. Computers & Security 77 (Aug. 2018). 10.1016\/j.cose.2018.04.002","DOI":"10.1016\/j.cose.2018.04.002"},{"key":"e_1_3_3_3_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858487"},{"key":"e_1_3_3_3_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300718"},{"key":"e_1_3_3_3_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753394"},{"key":"e_1_3_3_3_23_2","unstructured":"Steve Harrison Deborah Tatar and Phoebe Sengers. 2007. The Three Paradigms of HCI. Alt. Chi. Session at the SIGCHI Conference on human factors in computing systems (2007)."},{"key":"e_1_3_3_3_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979137"},{"key":"e_1_3_3_3_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376840"},{"key":"e_1_3_3_3_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/3098279.3098538"},{"key":"e_1_3_3_3_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/3173225.3173234"},{"key":"e_1_3_3_3_28_2","doi-asserted-by":"publisher","unstructured":"Michinari Kono Takumi Takahashi Hiromi Nakamura Takashi Miyaki and Jun Rekimoto. 2018. Design Guideline for Developing Safe Systems That Apply Electricity to the Human Body. ACM Trans. Comput.-Hum. Interact. 25 3 (June 2018). 10.1145\/3184743","DOI":"10.1145\/3184743"},{"key":"e_1_3_3_3_29_2","doi-asserted-by":"publisher","unstructured":"Bert-Jaap Koops. 2021. The Concept of Function Creep. Law Innovation and Technology 13 1 (Jan. 2021). 10.1080\/17579961.2021.1898299","DOI":"10.1080\/17579961.2021.1898299"},{"key":"e_1_3_3_3_30_2","doi-asserted-by":"publisher","unstructured":"Veronika Krauss Pejman Saeghe Alexander Boden Mohamed Khamis Mark McGill Jan Gugenheimer and Michael Nebeling. 2024. What Makes XR Dark? Examining Emerging Dark Patterns in Augmented and Virtual Reality through Expert Co-Design. ACM Transactions on Computer-Human Interaction (April 2024). 10.1145\/3660340","DOI":"10.1145\/3660340"},{"key":"e_1_3_3_3_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858335"},{"key":"e_1_3_3_3_32_2","volume-title":"Research Methods in Human-Computer Interaction (2 ed.)","author":"Lazar Jonathan","year":"2017","unstructured":"Jonathan Lazar, Jinjuan\u00a0Heidi Feng, and Harry Hochheiser. 2017. Research Methods in Human-Computer Interaction (2 ed.). Morgan Kaufmann."},{"key":"e_1_3_3_3_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00051"},{"key":"e_1_3_3_3_34_2","doi-asserted-by":"publisher","unstructured":"Minkyeong Lee Seungwoo Je Woojin Lee Daniel Ashbrook and Andrea Bianchi. 2019. ActivEarring: Spatiotemporal Haptic Cues on the Ears. IEEE Transactions on Haptics 12 4 (Oct. 2019). 10.1109\/TOH.2019.2925799","DOI":"10.1109\/TOH.2019.2925799"},{"key":"e_1_3_3_3_35_2","doi-asserted-by":"publisher","unstructured":"Michael Madary and Thomas\u00a0K. Metzinger. 2016. Real Virtuality: A Code of Ethical Conduct. Recommendations for Good Scientific Practice and the Consumers of VR-Technology. Frontiers in Robotics and AI 3 (Feb. 2016). 10.3389\/frobt.2016.00003","DOI":"10.3389\/frobt.2016.00003"},{"key":"e_1_3_3_3_36_2","doi-asserted-by":"publisher","DOI":"10.1145\/2856767.2856770"},{"key":"e_1_3_3_3_37_2","doi-asserted-by":"publisher","DOI":"10.1145\/2503713.2503740"},{"key":"e_1_3_3_3_38_2","doi-asserted-by":"publisher","DOI":"10.1145\/3359174"},{"key":"e_1_3_3_3_39_2","doi-asserted-by":"publisher","DOI":"10.1145\/2851581.2892475"},{"key":"e_1_3_3_3_40_2","doi-asserted-by":"publisher","unstructured":"Vikram Mehta Daniel Gooch Arosha Bandara Blaine Price and Bashar Nuseibeh. 2021. Privacy Care: A Tangible Interaction Framework for Privacy Management. ACM Trans. Internet Technol. 21 1 (Feb. 2021). 10.1145\/3430506","DOI":"10.1145\/3430506"},{"key":"e_1_3_3_3_41_2","doi-asserted-by":"publisher","unstructured":"Soroosh Mortezapoor Mohammad Ghazanfari Khrystyna Vasylevska Emanuel Vonach and Hannes Kaufmann. 2025. Safety for Mobile Encountered-Type Haptic Devices in Large-Scale Virtual Reality. Frontiers in Virtual Reality 6 (Oct. 2025). 10.3389\/frvir.2025.1648019","DOI":"10.3389\/frvir.2025.1648019"},{"key":"e_1_3_3_3_42_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48051-9_17"},{"key":"e_1_3_3_3_43_2","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.CSWP.29"},{"key":"e_1_3_3_3_44_2","doi-asserted-by":"publisher","unstructured":"Fiachra O\u2019Brolch\u00e1in Tim Jacquemard David Monaghan Noel O\u2019Connor Peter Novitzky and Bert Gordijn. 2016. The Convergence of Virtual Reality and Social Networks: Threats to Privacy and Autonomy. Science and Engineering Ethics 22 1 (Feb. 2016). 10.1007\/s11948-014-9621-1","DOI":"10.1007\/s11948-014-9621-1"},{"key":"e_1_3_3_3_45_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581018"},{"key":"e_1_3_3_3_46_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISMAR52148.2021.00036"},{"key":"e_1_3_3_3_47_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580766"},{"key":"e_1_3_3_3_48_2","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025824"},{"key":"e_1_3_3_3_49_2","doi-asserted-by":"publisher","unstructured":"Ashwin Ram and Shengdong Zhao. 2021. LSVP: Towards Effective On-the-go Video Learning Using Optical Head-Mounted Displays. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 5 1 (March 2021). 10.1145\/3448118","DOI":"10.1145\/3448118"},{"key":"e_1_3_3_3_50_2","doi-asserted-by":"publisher","DOI":"10.1145\/1054972.1055074"},{"key":"e_1_3_3_3_51_2","doi-asserted-by":"publisher","unstructured":"Robert\u00a0A. Rescorla. 1988. Pavlovian Conditioning: It\u2019s Not What You Think It Is. American Psychologist 43 3 (1988). 10.1037\/0003-066X.43.3.151","DOI":"10.1037\/0003-066X.43.3.151"},{"key":"e_1_3_3_3_52_2","doi-asserted-by":"publisher","DOI":"10.1145\/2914920.2915021"},{"key":"e_1_3_3_3_53_2","volume-title":"Threat Modeling: Designing for Security","author":"Shostack Adam","year":"2014","unstructured":"Adam Shostack. 2014. Threat Modeling: Designing for Security. John Wiley & Sons."},{"key":"e_1_3_3_3_54_2","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174221"},{"key":"e_1_3_3_3_55_2","doi-asserted-by":"crossref","unstructured":"Chad Spensky Jeffrey Stewart Arkady Yerukhimovich Richard Shay Ari Trachtenberg Rick Housley and Robert\u00a0K. Cunningham. 2016. SoK: Privacy on Mobile Devices \u2013 It\u2019s Complicated. Proceedings on Privacy Enhancing Technologies (2016).","DOI":"10.1515\/popets-2016-0018"},{"key":"e_1_3_3_3_56_2","doi-asserted-by":"publisher","unstructured":"James\u00a0S. Spiegel. 2018. The Ethics of Virtual Reality Technology: Social Hazards and Public Policy Recommendations. Science and Engineering Ethics 24 5 (Oct. 2018). 10.1007\/s11948-017-9979-y","DOI":"10.1007\/s11948-017-9979-y"},{"key":"e_1_3_3_3_57_2","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173914"},{"key":"e_1_3_3_3_58_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3501910"},{"key":"e_1_3_3_3_59_2","unstructured":"Mojtaba Vaismoradi and Sherrill Snelgrove. 2019. Theme in Qualitative Content Analysis and Thematic Analysis. Forum Qualitative Social Research 20 3 (2019)."},{"key":"e_1_3_3_3_60_2","doi-asserted-by":"publisher","DOI":"10.1145\/3678884.3681824"},{"key":"e_1_3_3_3_61_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642900"},{"key":"e_1_3_3_3_62_2","doi-asserted-by":"publisher","DOI":"10.1145\/3242587.3242645"},{"key":"e_1_3_3_3_63_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179301"},{"key":"e_1_3_3_3_64_2","doi-asserted-by":"publisher","DOI":"10.1145\/3332165.3347865"},{"key":"e_1_3_3_3_65_2","doi-asserted-by":"publisher","unstructured":"Yukang Yan Yingtian Shi Chun Yu and Yuanchun Shi. 2020. HeadCross: Exploring Head-Based Crossing Selection on Head-Mounted Displays. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 4 1 (March 2020). 10.1145\/3380983","DOI":"10.1145\/3380983"},{"key":"e_1_3_3_3_66_2","series-title":"(SOUPS \u201917)","volume-title":"Proceedings of the 13th Symposium on Usable Privacy and Security","author":"Zeng Eric","year":"2017","unstructured":"Eric Zeng, Shrirang Mare, and Franziska Roesner. 2017. End User Security and Privacy Concerns with Smart Homes. In Proceedings of the 13th Symposium on Usable Privacy and Security(SOUPS \u201917)."},{"key":"e_1_3_3_3_67_2","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2556981"},{"key":"e_1_3_3_3_68_2","doi-asserted-by":"publisher","unstructured":"Qingxiao Zheng Shengyang Xu Lingqing Wang Yiliu Tang Rohan\u00a0C. Salvi Guo Freeman and Yun Huang. 2023. Understanding Safety Risks and Safety Design in Social VR Environments. Proc. ACM Hum.-Comput. Interact. 7 CSCW1 (April 2023). 10.1145\/3579630","DOI":"10.1145\/3579630"},{"key":"e_1_3_3_3_69_2","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858232"}],"event":{"name":"CHI 2026: CHI Conference on Human Factors in Computing Systems","location":"Barcelona Spain","acronym":"CHI '26","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2026 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3772318.3790403","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T10:08:59Z","timestamp":1776247739000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3772318.3790403"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4,13]]},"references-count":68,"alternative-id":["10.1145\/3772318.3790403","10.1145\/3772318"],"URL":"https:\/\/doi.org\/10.1145\/3772318.3790403","relation":{},"subject":[],"published":{"date-parts":[[2026,4,13]]},"assertion":[{"value":"2026-04-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}