We are in the process of curating a list of this year’s publications — including links to social media, lab websites, and supplemental material. Currently, we have 68 full papers, 23 LBWs, three Journal papers, one alt.chi paper, two SIG, two Case Studies, one Interactivity, one Student Game Competition, and we lead three workshops. One paper received a best paper award and 14 papers received an honorable mention.
Disclaimer: This list is not complete yet; the DOIs might not be working yet.
Your publication from 2025 is missing? Please enter the details in this Google Forms and send us an email that you added a publication: contact@germanhci.de
Designing Effective Consent Mechanisms for Spontaneous Interactions in Augmented Reality
Maximiliane Windl (LMU Munich, Munich Center for Machine Learning (MCML)), Petra Zsofia Laboda (LMU Munich), Sven Mayer (LMU Munich)
Abstract | Tags: Full Paper, Privacy | Links:
@inproceedings{Windl2025DesigningEffective,
title = {Designing Effective Consent Mechanisms for Spontaneous Interactions in Augmented Reality},
author = {Maximiliane Windl (LMU Munich, Munich Center for Machine Learning (MCML)), Petra Zsofia Laboda (LMU Munich), Sven Mayer (LMU Munich)},
url = {https://www.medien.ifi.lmu.de/index.xhtml.en, website
https://www.linkedin.com/company/lmu-media-informatics-group, research group linkedin
https://www.linkedin.com/in/maximiliane-windl/, author's linkedin},
doi = {10.1145/3706598.3713519},
year = {2025},
date = {2025-04-26},
urldate = {2025-04-26},
abstract = {Ubiquitous computing devices like Augmented Reality (AR) glasses allow countless spontaneous interactions - all serving different goals. AR devices rely on data transfer to personalize recommendations and adapt to the user. Today's consent mechanisms, such as privacy policies, are suitable for long-lasting interactions; however, how users can consent to fast, spontaneous interactions is unclear. We first conducted two focus groups (N=17) to identify privacy-relevant scenarios in AR. We then conducted expert interviews (N=11) with co-design activities to establish effective consent mechanisms. Based on that, we contribute (1) a validated scenario taxonomy to define privacy-relevant AR interaction scenarios, (2) a flowchart to decide on the type of mechanisms considering contextual factors, (3) a design continuum and design aspects chart to create the mechanisms, and (4) a trade-off and prediction chart to evaluate the mechanism. Thus, we contribute a conceptual framework fostering a privacy-preserving future with AR.},
keywords = {Full Paper, Privacy},
pubstate = {published},
tppubtype = {inproceedings}
}
Hidden in Plain Sight: a Systematic Analysis of Privacy Policies in the Context of Body-worn 'FemTech' Technologies
Sophie Grimme (OFFIS - Institute for Information Technology), Susanna Marie Spoerl (OFFIS - Institute for Information Technology), Frederike Jung (Independent Researcher), Marion Koelle (OFFIS - Institute for Information Technology)
Abstract | Tags: Full Paper, Privacy | Links:
@inproceedings{Grimme2025HiddenPlain,
title = {Hidden in Plain Sight: a Systematic Analysis of Privacy Policies in the Context of Body-worn 'FemTech' Technologies},
author = {Sophie Grimme (OFFIS - Institute for Information Technology), Susanna Marie Spoerl (OFFIS - Institute for Information Technology), Frederike Jung (Independent Researcher), Marion Koelle (OFFIS - Institute for Information Technology)},
url = {https://hci.uni-oldenburg.de/de/, website
linkedin.com/in/sophie-grimme-ba84641b4, linkedin},
doi = {10.1145/3706598.3713702},
year = {2025},
date = {2025-04-26},
urldate = {2025-04-26},
abstract = {As HCI research turns to women's reproductive health as a topic of interest, an increasing number of female-oriented technologies (FemTech) are being marketed to consumers. This opens up a space for better management and understanding of intimate health but is not without risk. Reproductive health data collected by FemTech devices is highly sensitive and politicized. Breaches of privacy can cause or exacerbate discrimination and gender inequality, and negatively impact users' safety and well-being. It is therefore important that users are well informed about how their data is collected, handled, used and stored. This work contributes insights into whether and to what extent this is achieved by current FemTech. We conduct a structured content analysis of 18 in-effect privacy policies. Applying an empirically-grounded taxonomy, we identify challenges in policy wording, content and presentation. We conclude with recommendations for improving transparency and supporting users in providing informed consent and claiming data authority.},
keywords = {Full Paper, Privacy},
pubstate = {published},
tppubtype = {inproceedings}
}
Pixel Memories: Do Lifelog Summaries Fail to Enhance Memory but Offer Privacy-Aware Memory Assessments?
Passant ElAgroudy (DFKI GmBH), Rufat Rzayev (Dresden University of Technology), Tonja-Katrin Machulla (TU Chemnitz), Huy Viet Le (University of Stuttgart), Tilman Dingler (Delft University of Technology), Lars Lischke (Vrije Universiteit Amsterdam), Sarah Clinch (University of Manchester), Geoffrey Ward (University of Essex), Albrecht Schmidt (LMU Munich)
Abstract | Tags: Full Paper, Privacy | Links:
@inproceedings{ElAgroudy2025PixelMemories,
title = {Pixel Memories: Do Lifelog Summaries Fail to Enhance Memory but Offer Privacy-Aware Memory Assessments?},
author = {Passant ElAgroudy (DFKI GmBH), Rufat Rzayev (Dresden University of Technology), Tonja-Katrin Machulla (TU Chemnitz), Huy Viet Le (University of Stuttgart), Tilman Dingler (Delft University of Technology), Lars Lischke (Vrije Universiteit Amsterdam), Sarah Clinch (University of Manchester), Geoffrey Ward (University of Essex), Albrecht Schmidt (LMU Munich)},
url = {https://www.linkedin.com/in/passant-elagroudy-649284aa/?originalSubdomain=de, author\'s linkedin},
doi = {10.1145/3706598.3714145},
year = {2025},
date = {2025-04-26},
urldate = {2025-04-26},
abstract = {We explore the metaphorical "daily memory pill" concept – a brief pictorial lifelog recap aimed at reviving and preserving memories. Leveraging psychological strategies, we explore the potential of such summaries to boost autobiographical memory. We developed an automated lifelogging memory prosthesis and a research protocol (Automated Memory Validation ``AMV'') for conducting privacy-aware, in-situ evaluations. We conducted a real-world lifelogging experiment for a month (n=11). We also designed a browser ``Pixel Memories’’ for browsing one-week worth of lifelogs. The results suggest that daily timelapse summaries, while not yielding significant memory augmentation effects, also do not lead to memory degradation. Participants' confidence in recalled content remains unaltered, but the study highlights the challenge of users' overestimation of memory accuracy. Our core contributions, the AMV protocol and "Pixel Memories" browser, advance our understanding of memory augmentations and offer a privacy-preserving method for evaluating future ubicomp systems.},
keywords = {Full Paper, Privacy},
pubstate = {published},
tppubtype = {inproceedings}
}
PrivacyHub: A Functional Tangible and Digital Ecosystem for Interoperable Smart Home Privacy Awareness and Control
Maximiliane Windl (LMU Munich, Munich Center for Machine Learning (MCML)), Philipp Thalhammer (LMU Munich), David Müller (LMU Munich), Albrecht Schmidt (LMU Munich), Sebastian S. Feger (TH Rosenheim, LMU Munich)
Abstract | Tags: Full Paper, Privacy | Links:
@inproceedings{Windl2025Privacyhub,
title = {PrivacyHub: A Functional Tangible and Digital Ecosystem for Interoperable Smart Home Privacy Awareness and Control},
author = {Maximiliane Windl (LMU Munich, Munich Center for Machine Learning (MCML)), Philipp Thalhammer (LMU Munich), David Müller (LMU Munich), Albrecht Schmidt (LMU Munich), Sebastian S. Feger (TH Rosenheim, LMU Munich)},
url = {https://www.medien.ifi.lmu.de/index.xhtml.en, website
https://www.linkedin.com/company/lmu-media-informatics-group/, research group linkedin
https://www.linkedin.com/in/maximiliane-windl-8889b6195/, author's linkedin},
doi = {10.1145/3706598.3713517},
year = {2025},
date = {2025-04-26},
urldate = {2025-04-26},
abstract = {Hubs are at the core of most smart homes. Modern cross-ecosystem protocols and standards enable smart home hubs to achieve interoperability across devices, offering the unique opportunity to integrate universally available smart home privacy awareness and control features. To date, such privacy features mainly focus on individual products or prototypical research artifacts. We developed a cross-ecosystem hub featuring a tangible dashboard and a digital web application to deepen our understanding of how smart home users interact with functional privacy features. The ecosystem allows users to control the connectivity states of their devices and raises awareness by visualizing device positions, states, and data flows. We deployed the ecosystem in six households for one week and found that it increased participants' perceived control, awareness, and understanding of smart home privacy. We further found distinct differences between tangible and digital mechanisms. Our findings highlight the value of cross-ecosystem hubs for effective privacy management.},
keywords = {Full Paper, Privacy},
pubstate = {published},
tppubtype = {inproceedings}
}
Security Knight in Shining Armor: What and Who VPN Providers Claim to Shield Consumers Against
Felix Reichmann (Ruhr University Bochum), Jens Christian Opdenbusch (Ruhr University Bochum), Karola Marky (Ruhr University Bochum), Marco Gutfleisch (Ruhr University Bochum)
Abstract | Tags: Full Paper, Privacy | Links:
@inproceedings{Reichmann2025SecurityKnight,
title = {Security Knight in Shining Armor: What and Who VPN Providers Claim to Shield Consumers Against},
author = {Felix Reichmann (Ruhr University Bochum), Jens Christian Opdenbusch (Ruhr University Bochum), Karola Marky (Ruhr University Bochum), Marco Gutfleisch (Ruhr University Bochum)},
url = {https://informatik.rub.de/digisoul/, website},
doi = {10.1145/3706598.3713980},
year = {2025},
date = {2025-04-26},
urldate = {2025-04-26},
abstract = {Consumer virtual private network (VPN) providers promise online security and privacy by tunneling user traffic through their servers. However, there is a growing disparity between the users' perceptions of achievable security and privacy and the actual limitations of such services. In a large-scale, multi-step mixed methods study, we holistically investigated the degree to which 78 consumer VPN providers support or undermine proper mental models for their products and services. We collected search queries from 300 participants - coming from five countries across four continents - to identify suitable VPN providers and, subsequently their security and privacy promises. Among VPN providers’ statements, a large share contains misleading or false information, and more than half do not mention any threat agent at all. Our results extend the current research on consumer VPNs and provide a more realistic, holistic, and accurate overview of information on VPN provider websites.},
keywords = {Full Paper, Privacy},
pubstate = {published},
tppubtype = {inproceedings}
}