{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,17]],"date-time":"2024-12-17T07:10:30Z","timestamp":1734419430439,"version":"3.30.2"},"reference-count":27,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,8,28]],"date-time":"2024-08-28T00:00:00Z","timestamp":1724803200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,8,28]],"date-time":"2024-08-28T00:00:00Z","timestamp":1724803200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,8,28]]},"DOI":"10.1109\/pst62714.2024.10788063","type":"proceedings-article","created":{"date-parts":[[2024,12,16]],"date-time":"2024-12-16T19:15:09Z","timestamp":1734376509000},"page":"1-13","source":"Crossref","is-referenced-by-count":0,"title":["Visualizing Differential Privacy: Assessing Infographics' Impact on Layperson Data-sharing Decisions and Comprehension"],"prefix":"10.1109","author":[{"given":"Mst Mahamuda Sarkar","family":"Mithila","sequence":"first","affiliation":[{"name":"Ontario Tech University,Oshawa,Canada"}]},{"given":"Fangyi","family":"Yu","sequence":"additional","affiliation":[{"name":"Ontario Tech University,Oshawa,Canada"}]},{"given":"Miguel Vargas","family":"Martin","sequence":"additional","affiliation":[{"name":"Ontario Tech University,Oshawa,Canada"}]},{"given":"Shengqian","family":"Wang","sequence":"additional","affiliation":[{"name":"Ontario Tech University,Oshawa,Canada"}]}],"member":"263","reference":[{"key":"ref1","first-page":"265","article-title":"Calibrating noise to sensitivity in private data analysis","volume-title":"Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006","author":"Cynthia","year":"2006"},{"volume-title":"Differential privacy by Apple","year":"2023","key":"ref2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660348"},{"key":"ref4","first-page":"3574","article-title":"Collecting telemetry data privately","volume-title":"Proceedings of the 31st International Conference on Neural Information Processing Systems, NIPS\u201917","author":"Ding"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025698"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3485252"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560693"},{"key":"ref8","first-page":"175","article-title":"Exploring user-suitable metaphors for differentially private data analyses","volume-title":"Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022)","author":"Karegar"},{"key":"ref9","first-page":"117","article-title":"Replication: the effect of differential privacy communication on german users\u2019 comprehension and data sharing attitudes","volume-title":"Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022)","author":"K\u00fchtreiber"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00088"},{"key":"ref11","first-page":"1613","article-title":"What are the chances? explaining the epsilon parameter in differential privacy","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Nanayakkara"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3555762"},{"key":"ref13","article-title":"Using illustrations to communicate dif-ferential privacy trust models: an investigation of users\u2019 comprehension, perception, and data sharing decision","author":"Xiong","year":"2022","journal-title":"arXiv preprint"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.03.024"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2022-0058"},{"volume-title":"Learning with privacy at scale","year":"2017","author":"Differential","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24861-0_22"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.29012\/jpc.689"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2899387"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/VizSec53666.2021.00008"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2006.12018"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.01.015"},{"key":"ref23","article-title":"Informed consent online: A conceptual model and design principles","volume-title":"University of Washington Computer Science & Engineering Technical Report 00\u201312-2","volume":"8","author":"Friedman","year":"2000"},{"key":"ref24","article-title":"Differential privacy: A primer for a non-technical audience","author":"Wood","year":"2020","journal-title":"21 Vanderbilt Journal of Entertainment and Technology Law 209"},{"volume-title":"Differential privacy in (a bit) more detail","year":"2018","key":"ref25"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW54576.2021.00041"},{"key":"ref27","first-page":"579","article-title":"\u201cTere will be less privacy, of course\u201d: How and why people in 10 countries expect AI will affect privacy in the future","volume-title":"Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023)","author":"Kelley"}],"event":{"name":"2024 21st Annual International Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2024,8,28]]},"location":"Sydney, Australia","end":{"date-parts":[[2024,8,30]]}},"container-title":["2024 21st Annual International Conference on Privacy, Security and Trust (PST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10788036\/10788037\/10788063.pdf?arnumber=10788063","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,17]],"date-time":"2024-12-17T06:00:49Z","timestamp":1734415249000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10788063\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,28]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/pst62714.2024.10788063","relation":{},"subject":[],"published":{"date-parts":[[2024,8,28]]}}}