Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (7)

Search Parameters:
Keywords = bystanders’ privacy

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
17 pages, 549 KiB  
Article
Cultural Differences in the Use of Augmented Reality Smart Glasses (ARSGs) Between the U.S. and South Korea: Privacy Concerns and the Technology Acceptance Model
by Se Jung Kim, Yoon Esther Lee and T. Makana Chock
Appl. Sci. 2025, 15(13), 7430; https://doi.org/10.3390/app15137430 - 2 Jul 2025
Viewed by 440
Abstract
Augmented Reality Smart Glasses (ARSGs) allow users to engage in picture-taking and video recording, as well as real-time storage and sharing of pictures and videos through cloud services. Unlike smartphones, newer ARSGs resemble ordinary sunglasses, allowing for unobtrusive recording. As these devices become [...] Read more.
Augmented Reality Smart Glasses (ARSGs) allow users to engage in picture-taking and video recording, as well as real-time storage and sharing of pictures and videos through cloud services. Unlike smartphones, newer ARSGs resemble ordinary sunglasses, allowing for unobtrusive recording. As these devices become available on an international market, it is important to understand how different cultural attitudes towards privacy and the recording and sharing of images of bystanders could impact the acceptance and adoption of ARSGs. South Korea and the United States have vastly different culturally based perceptions of photography and recording in public. S. Korea has cultural and legal restrictions in place, while the U.S.’s values of freedom of expression and individual rights are reflected in limited restrictions. Accordingly, drawing upon the Technology Acceptance Model (TAM), this paper explored the impact of privacy concerns on key constructs of the TAM for U.S. and S. Korean participants. This paper examined how Americans’ (U.S. = 402) and S. Koreans’ (S. Korea = 898) perceived usefulness, perceived ease of use, attitude toward using, and behavioral intention to use ARSGs were impacted by privacy concerns. The results of this study found that S. Korean respondents had significantly greater privacy concerns about using ARSGs than U.S. respondents. However, they also had significantly more positive attitudes and greater behavioral intentions to use ARSGs. Path analyses examining ARSGs’ acceptance revealed that privacy concerns impacted attitudes towards ARSGs, but that these had a greater impact on U.S. participants than on Koreans. The results highlight the importance of considering nuanced cultural perspectives, specifically privacy concerns, in examining the development and adoption of new technologies. Raw data and scripts for this study are available to ensure reproducibility. Full article
(This article belongs to the Special Issue Virtual and Augmented Reality: Theory, Methods, and Applications)
Show Figures

Figure 1

20 pages, 5373 KiB  
Article
The Influence of Victim Self-Disclosure on Bystander Intervention in Cyberbullying
by Yuze Zeng, Junze Xiao, Danfeng Li, Jiaxiu Sun, Qingqi Zhang, Ai Ma, Ke Qi, Bin Zuo and Xiaoqian Liu
Behav. Sci. 2023, 13(10), 829; https://doi.org/10.3390/bs13100829 - 9 Oct 2023
Cited by 4 | Viewed by 3151
Abstract
The frequent occurrences of cyberbullying on social platforms have sparked a great deal of social conflict, and bystander intervention plays a crucial role in preventing the escalation of cyberbullying. This research examines the impact of victim self-disclosure on bystander intervention in cyberbullying through [...] Read more.
The frequent occurrences of cyberbullying on social platforms have sparked a great deal of social conflict, and bystander intervention plays a crucial role in preventing the escalation of cyberbullying. This research examines the impact of victim self-disclosure on bystander intervention in cyberbullying through two experimental studies. The studies collected data from March to July of 2022, utilizing a convenience sampling approach to recruit university students as experiment participants. Study 1 recruited 247 valid participants, while Study 2 recruited 522 eligible participants. The results of Study 1 indicate that the perceptible dimensions (frequency, privacy, and valence) of victim self-disclosure impact bystander intervention. Specifically, in a low privacy context, positive self-disclosure increases bystander intervention, while negative self-disclosure does the opposite. The results of Study 2 suggest that the valence of self-disclosure affects bystander intervention through the mediation of victim blaming, with interpersonal distance moderating the impact of victim self-disclosure valence on the extent of victim blaming. This moderated mediation model clarifies the psychological process by which the valence of victim self-disclosure affects bystander intervention. The findings of this study contribute to the understanding of the social psychological process behind bystander intervention, providing a scientific basis and pathway for reducing cyberbullying and fostering a harmonious online environment. Full article
Show Figures

Figure 1

20 pages, 3062 KiB  
Article
A User Study of a Wearable System to Enhance Bystanders’ Facial Privacy
by Alfredo J. Perez, Sherali Zeadally, Scott Griffith, Luis Y. Matos Garcia and Jaouad A. Mouloud
IoT 2020, 1(2), 198-217; https://doi.org/10.3390/iot1020013 - 10 Oct 2020
Cited by 10 | Viewed by 3942
Abstract
The privacy of users and information are becoming increasingly important with the growth and pervasive use of mobile devices such as wearables, mobile phones, drones, and Internet of Things (IoT) devices. Today many of these mobile devices are equipped with cameras which enable [...] Read more.
The privacy of users and information are becoming increasingly important with the growth and pervasive use of mobile devices such as wearables, mobile phones, drones, and Internet of Things (IoT) devices. Today many of these mobile devices are equipped with cameras which enable users to take pictures and record videos anytime they need to do so. In many such cases, bystanders’ privacy is not a concern, and as a result, audio and video of bystanders are often captured without their consent. We present results from a user study in which 21 participants were asked to use a wearable system called FacePET developed to enhance bystanders’ facial privacy by providing a way for bystanders to protect their own privacy rather than relying on external systems for protection. While past works in the literature focused on privacy perceptions of bystanders when photographed in public/shared spaces, there has not been research with a focus on user perceptions of bystander-based wearable devices to enhance privacy. Thus, in this work, we focus on user perceptions of the FacePET device and/or similar wearables to enhance bystanders’ facial privacy. In our study, we found that 16 participants would use FacePET or similar devices to enhance their facial privacy, and 17 participants agreed that if smart glasses had features to conceal users’ identities, it would allow them to become more popular. Full article
(This article belongs to the Special Issue Cyber Security and Privacy in IoT)
Show Figures

Graphical abstract

20 pages, 10949 KiB  
Article
Prevention of Unintended Appearance in Photos Based on Human Behavior Analysis
by Yuhi Kaihoko, Phan Xuan Tan and Eiji Kamioka
Information 2020, 11(10), 468; https://doi.org/10.3390/info11100468 - 2 Oct 2020
Cited by 1 | Viewed by 2855
Abstract
Nowadays, with smartphones, people can easily take photos, post photos to any social networks, and use the photos for various purposes. This leads to a social problem that unintended appearance in photos may threaten the facial privacy of photographed people. Some solutions to [...] Read more.
Nowadays, with smartphones, people can easily take photos, post photos to any social networks, and use the photos for various purposes. This leads to a social problem that unintended appearance in photos may threaten the facial privacy of photographed people. Some solutions to protect facial privacy in photos have already been proposed. However, most of them rely on different techniques to de-identify photos which can be done only by photographers, giving no choice to photographed person. To deal with that, we propose an approach that allows a photographed person to proactively detect whether someone is intentionally/unintentionally trying to take pictures of him. Thereby, he can have appropriate reaction to protect the facial privacy. In this approach, we assume that the photographed person uses a wearable camera to record the surrounding environment in real-time. The skeleton information of likely photographers who are captured in the monitoring video is then extracted and put into the calculation of dynamic programming score which is eventually compared with a threshold for recognition of photo-taking behavior. Experimental results demonstrate that by using the proposed approach, the photo-taking behavior is precisely recognized with high accuracy of 92.5%. Full article
Show Figures

Figure 1

15 pages, 754 KiB  
Article
A Snapshot of Bystander Attitudes about Mobile Live-Streaming Video in Public Settings
by Cori Faklaris, Francesco Cafaro, Asa Blevins, Matthew A. O’Haver and Neha Singhal
Informatics 2020, 7(2), 10; https://doi.org/10.3390/informatics7020010 - 27 Mar 2020
Cited by 14 | Viewed by 7192
Abstract
With the advent of mobile apps such as Periscope, Facebook Live, and now TikTok, live-streaming video has become a commonplace form of social computing. It has not been clear, however, to what extent the current ubiquity of smartphones is impacting this technology’s acceptance [...] Read more.
With the advent of mobile apps such as Periscope, Facebook Live, and now TikTok, live-streaming video has become a commonplace form of social computing. It has not been clear, however, to what extent the current ubiquity of smartphones is impacting this technology’s acceptance in everyday social situations, and how mobile contexts or affordances will affect and be affected by shifts in social norms and policy debates regarding privacy, surveillance, and intellectual property. This ethnographic-style research provides a snapshot of attitudes about the technology among a sample of US participants in two public contexts, both held outdoors in August 2016: A sports tailgating event and a meeting event. Interviews with n = 20 bystanders revealed that many are not fully aware of when their image or speech is being live-streamed in a casual context, and some want stronger notifications of and ability to consent to such broadcasting. We offer design recommendations to help bridge this socio-technical gap. Full article
(This article belongs to the Special Issue Feature Paper in Informatics)
Show Figures

Figure 1

14 pages, 320 KiB  
Article
Doxing: What Adolescents Look for and Their Intentions
by Mengtong Chen, Anne Shann Yue Cheung and Ko Ling Chan
Int. J. Environ. Res. Public Health 2019, 16(2), 218; https://doi.org/10.3390/ijerph16020218 - 14 Jan 2019
Cited by 32 | Viewed by 11680
Abstract
Doxing is a form of cyberbullying in which personal information on others is sought and released, thereby violating their privacy and facilitating further harassment. This study examined adolescents’ doxing participation using a representative sample of 2120 Hong Kong secondary school students. Just over [...] Read more.
Doxing is a form of cyberbullying in which personal information on others is sought and released, thereby violating their privacy and facilitating further harassment. This study examined adolescents’ doxing participation using a representative sample of 2120 Hong Kong secondary school students. Just over one in 10 had engaged in doxing, and doxing behavior significantly increased the probability of disclosing personal information on others (odds ratio ranged between 2.705 and 5.181). Social and hostile doxing were the two most common forms of doxing. Girls were significantly more likely to conduct social doxing (χ2 = 11.84, p < 0.001), where their target was to obtain social information (χ2 = 4.79, p = 0.029), whereas boys were more likely to engage in hostile doxing aimed at obtaining personally identifiable information (χ2 = 4.31, p = 0.038) and information on others’ current living situations (χ2 = 4.17, p = 0.041). Students who had perpetrated doxing acts were more likely to have experienced information disclosure as victims, perpetrators, or bystanders. Future studies should examine doxing’s impacts and its relationship with other forms of cyberbullying and traditional bullying. Because doxing may lead to on- and off-line harassment, family, adolescents, schools, and communities must work together to develop effective approaches for combating it. Full article
(This article belongs to the Special Issue Child Victimisation)
19 pages, 3305 KiB  
Article
FacePET: Enhancing Bystanders’ Facial Privacy with Smart Wearables/Internet of Things
by Alfredo J. Perez, Sherali Zeadally, Luis Y. Matos Garcia, Jaouad A. Mouloud and Scott Griffith
Electronics 2018, 7(12), 379; https://doi.org/10.3390/electronics7120379 - 3 Dec 2018
Cited by 14 | Viewed by 4996
Abstract
Given the availability of cameras in mobile phones, drones and Internet-connected devices, facial privacy has become an area of major interest in the last few years, especially when photos are captured and can be used to identify bystanders’ faces who may have not [...] Read more.
Given the availability of cameras in mobile phones, drones and Internet-connected devices, facial privacy has become an area of major interest in the last few years, especially when photos are captured and can be used to identify bystanders’ faces who may have not given consent for these photos to be taken and be identified. Some solutions to protect facial privacy in photos currently exist. However, many of these solutions do not give a choice to bystanders because they rely on algorithms that de-identify photos or protocols to deactivate devices and systems not controlled by bystanders, thereby being dependent on the bystanders’ trust in these systems to protect his/her facial privacy. To address these limitations, we propose FacePET (Facial Privacy Enhancing Technology), a wearable system worn by bystanders and designed to enhance facial privacy. We present the design, implementation, and evaluation of the FacePET and discuss some open research issues. Full article
(This article belongs to the Special Issue IoT in 5G)
Show Figures

Figure 1

Back to TopTop