All one needs to know about metaverse: A complete survey on technological singularity, virtual ecosystem, and research agenda

LH Lee, T Braud, P Zhou, L Wang, D Xu, Z Lin… - arXiv preprint arXiv …, 2021 - arxiv.org
Since the popularisation of the Internet in the 1990s, the cyberspace has kept evolving. We
have created various computer-mediated virtual environments including social networks …

Honeysuckle: Annotation-guided code generation of in-app privacy notices

T Li, EB Neundorfer, Y Agarwal, JI Hong - Proceedings of the ACM on …, 2021 - dl.acm.org
In-app privacy notices can help smartphone users make informed privacy decisions.
However, they are rarely used in real-world apps, since developers often lack the …

Marketing in the metaverse: A sceptical viewpoint of opportunities and future research directions

K Israfılzade - The Eurasia Proceedings of Educational and Social …, 2022 - dergipark.org.tr
Metaverse can be a difficult concept to comprehend because of its nature which includes
richness and complexity. Researchers, managers, and opinion leaders anticipate that the …

DIPA2: An Image Dataset with Cross-cultural Privacy Perception Annotations

A Xu, Z Zhou, K Miyazaki, R Yoshikawa… - Proceedings of the …, 2024 - dl.acm.org
The world today is increasingly visual. Many of the most popular online social networking
services are largely powered by images, making image privacy protection a critical research …

Theophany: Multimodal speech augmentation in instantaneous privacy channels

A Kumar, T Braud, LH Lee, P Hui - Proceedings of the 29th ACM …, 2021 - dl.acm.org
Many factors affect speech intelligibility in face-to-face conversations. These factors lead
conversation participants to speak louder and more distinctively, exposing the content to …

PARROT: Interactive privacy-aware internet of things application design tool

N Alhirabi, S Beaumont, JT Llanos… - Proceedings of the …, 2023 - dl.acm.org
Internet of Things (IoT) applications typically collect and analyse personal data that is
categorised as sensitive or special category of personal data. These data are subject to a …

Implementing gdpr for mobile and ubiquitous computing

CB Fernandez, T Braud, P Hui - Proceedings of the 23rd Annual …, 2022 - dl.acm.org
The General Data Protection Regulation (GDPR) presents directives to give data subjects
control over their personal data. These directives impose data-collecting and processing …

Assessing the relationship between mobile devices usage, self-efficacy and online information seeking behavior: a demographic analysis in academic rural context

M Waqas, S Rafiq, C Ya, J Wu - Aslib Journal of Information …, 2024 - emerald.com
Purpose In recent years, the use of mobile devices for academic persistence has grown to
be an indispensable element of students' learning, highlighting the broad acceptance and …

Air Gap: Protecting Privacy-Conscious Conversational Agents

E Bagdasaryan, R Yi, S Ghalebikesabi… - arXiv preprint arXiv …, 2024 - arxiv.org
The growing use of large language model (LLM)-based conversational agents to manage
sensitive user data raises significant privacy concerns. While these agents excel at …

Stepping Into the Next Decade of Ubiquitous and Pervasive Computing: UbiComp and ISWC 2021

R Majethia, S Ghosh, HR Nolasco… - IEEE Pervasive …, 2022 - ieeexplore.ieee.org
The 2021 ACM International Joint Conference on Pervasive and Ubiquitous Computing
(UbiComp 2021) took place from September 21–26 virtually, around the world; co-located …