All one needs to know about metaverse: A complete survey on technological singularity, virtual ecosystem, and research agenda
Since the popularisation of the Internet in the 1990s, the cyberspace has kept evolving. We
have created various computer-mediated virtual environments including social networks …
have created various computer-mediated virtual environments including social networks …
Honeysuckle: Annotation-guided code generation of in-app privacy notices
In-app privacy notices can help smartphone users make informed privacy decisions.
However, they are rarely used in real-world apps, since developers often lack the …
However, they are rarely used in real-world apps, since developers often lack the …
Marketing in the metaverse: A sceptical viewpoint of opportunities and future research directions
K Israfılzade - The Eurasia Proceedings of Educational and Social …, 2022 - dergipark.org.tr
Metaverse can be a difficult concept to comprehend because of its nature which includes
richness and complexity. Researchers, managers, and opinion leaders anticipate that the …
richness and complexity. Researchers, managers, and opinion leaders anticipate that the …
DIPA2: An Image Dataset with Cross-cultural Privacy Perception Annotations
The world today is increasingly visual. Many of the most popular online social networking
services are largely powered by images, making image privacy protection a critical research …
services are largely powered by images, making image privacy protection a critical research …
Theophany: Multimodal speech augmentation in instantaneous privacy channels
Many factors affect speech intelligibility in face-to-face conversations. These factors lead
conversation participants to speak louder and more distinctively, exposing the content to …
conversation participants to speak louder and more distinctively, exposing the content to …
PARROT: Interactive privacy-aware internet of things application design tool
N Alhirabi, S Beaumont, JT Llanos… - Proceedings of the …, 2023 - dl.acm.org
Internet of Things (IoT) applications typically collect and analyse personal data that is
categorised as sensitive or special category of personal data. These data are subject to a …
categorised as sensitive or special category of personal data. These data are subject to a …
Implementing gdpr for mobile and ubiquitous computing
The General Data Protection Regulation (GDPR) presents directives to give data subjects
control over their personal data. These directives impose data-collecting and processing …
control over their personal data. These directives impose data-collecting and processing …
Assessing the relationship between mobile devices usage, self-efficacy and online information seeking behavior: a demographic analysis in academic rural context
M Waqas, S Rafiq, C Ya, J Wu - Aslib Journal of Information …, 2024 - emerald.com
Purpose In recent years, the use of mobile devices for academic persistence has grown to
be an indispensable element of students' learning, highlighting the broad acceptance and …
be an indispensable element of students' learning, highlighting the broad acceptance and …
Air Gap: Protecting Privacy-Conscious Conversational Agents
E Bagdasaryan, R Yi, S Ghalebikesabi… - arXiv preprint arXiv …, 2024 - arxiv.org
The growing use of large language model (LLM)-based conversational agents to manage
sensitive user data raises significant privacy concerns. While these agents excel at …
sensitive user data raises significant privacy concerns. While these agents excel at …
Stepping Into the Next Decade of Ubiquitous and Pervasive Computing: UbiComp and ISWC 2021
The 2021 ACM International Joint Conference on Pervasive and Ubiquitous Computing
(UbiComp 2021) took place from September 21–26 virtually, around the world; co-located …
(UbiComp 2021) took place from September 21–26 virtually, around the world; co-located …