{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T14:22:09Z","timestamp":1773411729023,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,5,2]],"date-time":"2017-05-02T00:00:00Z","timestamp":1493683200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,5,2]]},"DOI":"10.1145\/3025453.3025698","type":"proceedings-article","created":{"date-parts":[[2017,5,3]],"date-time":"2017-05-03T12:34:28Z","timestamp":1493814868000},"page":"3833-3837","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["Towards Understanding Differential Privacy"],"prefix":"10.1145","author":[{"given":"Brooke","family":"Bullek","sequence":"first","affiliation":[{"name":"Bucknell University, Lewisburg, PA, USA"}]},{"given":"Stephanie","family":"Garboski","sequence":"additional","affiliation":[{"name":"Bucknell University, Lewisburg, PA, USA"}]},{"given":"Darakhshan J.","family":"Mir","sequence":"additional","affiliation":[{"name":"Bucknell University, Lewisburg, PA, USA"}]},{"given":"Evan M.","family":"Peck","sequence":"additional","affiliation":[{"name":"Bucknell University, Lewisburg, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,5,2]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.aaa1465"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1086\/656423"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.2015.1050028"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1177\/075910630207500104"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12394-010-0062-y"},{"key":"e_1_3_2_2_6_1","volume-title":"The Privacy Policy Paradox. In Twelfth Symposium on Usable Privacy and Security (SOUPS","author":"Coen Rena","year":"2016","unstructured":"Rena Coen , Jennifer King , and Richmond Wong . 2016 . The Privacy Policy Paradox. In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016). Rena Coen, Jennifer King, and Richmond Wong. 2016. The Privacy Policy Paradox. In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016)."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1177\/0049124110390768"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/11787006_1"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2011.88"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2007.70539"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pgen.1000167"},{"key":"e_1_3_2_2_14_1","volume-title":"On-Line Privacy Behavior: Using User Interfaces for Salient Factors. Journal of Computer and Communications","author":"Hughes-Roberts Thomas","year":"2014","unstructured":"Thomas Hughes-Roberts and Elahe Kani-Zabihi . 2014. On-Line Privacy Behavior: Using User Interfaces for Salient Factors. Journal of Computer and Communications ( 2014 ), 220--231. Thomas Hughes-Roberts and Elahe Kani-Zabihi. 2014. On-Line Privacy Behavior: Using User Interfaces for Salient Factors. Journal of Computer and Communications (2014), 220--231."},{"key":"e_1_3_2_2_15_1","volume-title":"Advances in Neural Information Processing Systems 27 (NIPS","author":"Kairouz Peter","year":"2014","unstructured":"Peter Kairouz , Sewoong Oh , and Pramod Viswanath . Extremal Mechanisms for Local Differential Privacy . In Advances in Neural Information Processing Systems 27 (NIPS 2014 ). 1--9. Peter Kairouz, Sewoong Oh, and Pramod Viswanath. Extremal Mechanisms for Local Differential Privacy. In Advances in Neural Information Processing Systems 27 (NIPS 2014). 1--9."},{"key":"e_1_3_2_2_16_1","volume-title":"Symposium on Usable Privacy and Security (SOUPS 2010)","author":"Kelley Patrick Gage","year":"2010","unstructured":"Patrick Gage Kelley . 2010 . Conducting Usable Privacy & Security Studies with Amazon's Mechanical Turk . Symposium on Usable Privacy and Security (SOUPS 2010) (2010). Patrick Gage Kelley. 2010. Conducting Usable Privacy & Security Studies with Amazon's Mechanical Turk. Symposium on Usable Privacy and Security (SOUPS 2010) (2010)."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1004361819974"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"crossref","unstructured":"Gerty Lensvelt-Mulders Joop Hox and Peter Van Der Heijden. 2005. How to Improve the Efficiency of Randomised Response Designs. (2005) 253--265.  Gerty Lensvelt-Mulders Joop Hox and Peter Van Der Heijden. 2005. How to Improve the Efficiency of Randomised Response Designs. (2005) 253--265.","DOI":"10.1007\/s11135-004-0432-3"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1975.10479866"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.33"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.3102\/1076998609332747"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.92.2.487"},{"key":"e_1_3_2_2_23_1","first-page":"104","article-title":"A Critical Evaluation of the Randomized Response Method","volume":"20","author":"Umesh Uchila","year":"1996","unstructured":"Uchila Umesh and Robert Peterson . 1996 . A Critical Evaluation of the Randomized Response Method . Sage Publications 20 , 1 (1996), 104 -- 138 . Uchila Umesh and Robert Peterson. 1996. A Critical Evaluation of the Randomized Response Method. Sage Publications 20, 1 (1996), 104--138.","journal-title":"Sage Publications"},{"key":"e_1_3_2_2_24_1","volume-title":"From Facebook Regrets to Facebook Privacy Nudges. Ohio State Law Journal","author":"Wang Yang","year":"2013","unstructured":"Yang Wang , Pedro Leon , Xiaoxuan Chen , Saranga Komanduri , and Gregory Norcie . 2013. From Facebook Regrets to Facebook Privacy Nudges. Ohio State Law Journal ( 2013 ), 1307--1335. Yang Wang, Pedro Leon, Xiaoxuan Chen, Saranga Komanduri, and Gregory Norcie. 2013. From Facebook Regrets to Facebook Privacy Nudges. Ohio State Law Journal (2013), 1307--1335."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557413"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1965.10480775"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1177\/0049124113500474"}],"event":{"name":"CHI '17: CHI Conference on Human Factors in Computing Systems","location":"Denver Colorado USA","acronym":"CHI '17","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3025453.3025698","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3025453.3025698","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:03:22Z","timestamp":1750215802000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3025453.3025698"}},"subtitle":["When Do People Trust Randomized Response Technique?"],"short-title":[],"issued":{"date-parts":[[2017,5,2]]},"references-count":26,"alternative-id":["10.1145\/3025453.3025698","10.1145\/3025453"],"URL":"https:\/\/doi.org\/10.1145\/3025453.3025698","relation":{},"subject":[],"published":{"date-parts":[[2017,5,2]]},"assertion":[{"value":"2017-05-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}