{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T19:04:16Z","timestamp":1776107056328,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":69,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,13]],"date-time":"2022-11-13T00:00:00Z","timestamp":1668297600000},"content-version":"vor","delay-in-days":366,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1850187, CNS-1942772, 2030859"],"award-info":[{"award-number":["CNS-1850187, CNS-1942772, 2030859"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012642","name":"Mozilla Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012642","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100004332","name":"JPMorgan Chase and Company","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100004332","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3485252","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:33Z","timestamp":1636805133000},"page":"3037-3052","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":47,"title":["\"I need a better description\": An Investigation Into User Expectations For Differential Privacy"],"prefix":"10.1145","author":[{"given":"Rachel","family":"Cummings","sequence":"first","affiliation":[{"name":"Columbia University, New York, NY, USA"}]},{"given":"Gabriel","family":"Kaptchuk","sequence":"additional","affiliation":[{"name":"Boston University, Boston, MA, USA"}]},{"given":"Elissa M.","family":"Redmiles","sequence":"additional","affiliation":[{"name":"Max Planck Institute for Software Systems, Saarbr\u00fccken, Germany"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"The modernization of statistical disclosure limitation at the U","author":"Abowd John M.","year":"2020","unstructured":"John M. Abowd, Gary L. Benedetto, Simson L. Garfinkel, Scot A. Dahl, Aref N. Dajani, Matthew Graham, Michael B. Hawes, Vishesh Karwa, Daniel Kifer, Hang Kim, Philip Leclerc, Ashwin Machanavajjhala, Jerome P. Reiter, Rolando Rodriguez, Ian M. Schmutte, William N. Sexton, Phyllis E. Singer, and Lars Vilhuber. 2020. The modernization of statistical disclosure limitation at the U.S. Census Bureau. https:\/\/www2.census.gov\/adrm\/CED\/Papers\/FY21\/2020-08-AbowdBenedettoGarfinkelDahletal-The%20modernization%20of.pdf."},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the 8th USENIX Workshop on Free and Open Communications on the Internet (FOCI 18)","author":"Abu-Salma Ruba","year":"2018","unstructured":"Ruba Abu-Salma, Elissa M. Redmiles, Blase Ur, and Miranda Wei. 2018. Exploring User Mental Models of End-to-End Encrypted Communication Tools. In Proceedings of the 8th USENIX Workshop on Free and Open Communications on the Internet (FOCI 18). USENIX Association, Baltimore, MD. https:\/\/www.usenix.org\/conference\/foci18\/presentation\/abu-salma"},{"key":"e_1_3_2_1_3_1","unstructured":"Apple. 2018. Differential Privacy. https:\/\/www.apple.com\/privacy\/docs\/Differential_Privacy_Overview.pdf."},{"key":"e_1_3_2_1_4_1","unstructured":"Brooke Auxier Lee Rainie Monica Anderson Andrew Perrin Madhu Kumar and Erica Turner. 2019. Americans and Privacy: Concerned Confused and Feeling Lack of Control Over Their Personal Information. https:\/\/www.pewresearch.org\/internet\/2019\/11\/15\/americans-and-privacy-concerned-confused-and-feeling-lack-of-control-over-their-personal-information\/."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858510"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.2517-6161.1995.tb02031.x"},{"key":"e_1_3_2_1_7_1","volume-title":"Contextual integrity through the lens of computer science","author":"Benthall Sebastian","unstructured":"Sebastian Benthall, Seda G\u00fcrses, and Helen Nissenbaum. 2017. Contextual integrity through the lens of computer science .Now Publishers."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/291224.291229"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025698"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488406"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1914598117"},{"key":"e_1_3_2_1_12_1","unstructured":"Jamie Condliffe. 2019. The Week in Tech: Facebook's First Step Toward Treating Our Data Better. https:\/\/www.nytimes.com\/2019\/08\/23\/technology\/big-tech-data.html."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1125864.1125890"},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of 2nd FATREC Workshop on Responsible Recommendation. ACM.","author":"Cummings Rachel","year":"2018","unstructured":"Rachel Cummings and Deven Desai. 2018. The Role of Differential Privacy in GDPR Compliance. In Proceedings of 2nd FATREC Workshop on Responsible Recommendation. ACM."},{"key":"e_1_3_2_1_15_1","unstructured":"Inbal Dekel Rachel Cummings Ori Heffetz and Katrina Ligett. 2021. Differential Privacy in Economics Experiments: A Public-Good-Game Application. Pre-print."},{"key":"e_1_3_2_1_16_1","unstructured":"Bolin Ding Jana Kulkarni and Sergey Yekhanin. 2017. Collecting Telemetry Data Privately. In Advances in Neural Information Processing Systems 30 (NIPS '17). Advances in Neural Information Processing Systems 3574--3583."},{"key":"e_1_3_2_1_17_1","volume-title":"Differential Privacy: A Survey of Results. In Theory and Applications of Models of Computation","author":"Dwork Cynthia","year":"2008","unstructured":"Cynthia Dwork. 2008. Differential Privacy: A Survey of Results. In Theory and Applications of Models of Computation, Manindra Agrawal, Dingzhu Du, Zhenhua Duan, and Angsheng Li (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 1--19."},{"key":"e_1_3_2_1_18_1","volume-title":"Science","volume":"349","author":"Dwork Cynthia","year":"2015","unstructured":"Cynthia Dwork, Vitaly Feldman, Moritz Hardt, Toniann Pitassi, Omer Reingold, and Aaron Roth. 2015. The reusable holdout: Preserving validity in adaptive data analysis. Science, Vol. 349, 6248 (2015), 636--638."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1536414.1536467"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1561\/0400000042"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2005.844927"},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. 1669--1678","author":"Egelman Serge","year":"2015","unstructured":"Serge Egelman, Raghudeep Kannavara, and Richard Chow. 2015. Is this thing on? Crowdsourcing privacy indicators for ubiquitous sensing platforms. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. 1669--1678."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660348"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.2005.00608.x"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1416587112"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2010.85"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1177\/0894439310397146"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.64"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780198843498.003.0007"},{"key":"e_1_3_2_1_31_1","unstructured":"Michael Hawes. 2019. Title 13 Differential Privacy and the 2020 Decennial Census. https:\/\/www2.census.gov\/about\/policies\/2019--11-paper-differential-privacy.pdf."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1257\/jep.28.2.75"},{"key":"e_1_3_2_1_33_1","volume-title":"Payman Mohassel, and Alex Pompe.","author":"Ama\u00e7","year":"2020","unstructured":"Ama\u00e7 Herda?delen, Alex Dow, Bogdan State, Payman Mohassel, and Alex Pompe. 2020. New privacy-protected Facebook data for independent research on social media's impact on democracy. https:\/\/research.fb.com\/blog\/2020\/06\/protecting-privacy-in-facebook-mobility-data-during-the-covid-19-response\/."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078845"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/985692.985752"},{"key":"e_1_3_2_1_36_1","unstructured":"Noah Johnson and Joe Near. 2019. sql-differential-privacy. https:\/\/github.com\/uber-archive\/sql-differential-privacy."},{"key":"e_1_3_2_1_37_1","volume-title":"Eleventh Symposium On Usable Privacy and Security (SOUPS). ACM, 39--52","author":"Kang Ruogu","year":"2015","unstructured":"Ruogu Kang, Laura Dabbish, Nathaniel Fruchter, and Sara Kiesler. 2015. \"My Data Just Goes Everywhere:\" User mental models of the internet and implications for privacy and security. In Eleventh Symposium On Usable Privacy and Security (SOUPS). ACM, 39--52."},{"key":"e_1_3_2_1_38_1","volume-title":"How good is good enough for COVID19 apps? The influence of benefits, accuracy, and privacy on willingness to adopt. arXiv preprint arXiv:2005.04343","author":"Kaptchuk Gabriel","year":"2020","unstructured":"Gabriel Kaptchuk, Daniel G Goldstein, Eszter Hargittai, Jake Hofman, and Elissa M Redmiles. 2020. How good is good enough for COVID19 apps? The influence of benefits, accuracy, and privacy on willingness to adopt. arXiv preprint arXiv:2005.04343 (2020)."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1137\/090756090"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1177\/0272989X09333122"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572538"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00060"},{"key":"e_1_3_2_1_43_1","volume-title":"User Mental Models of Cryptocurrency Systems - A Grounded Theory Approach. (Aug","author":"Mai Alexandra","year":"2020","unstructured":"Alexandra Mai, Katharina Pfeffer, Matthias Gusenbauer, Edgar Weippl, and Katharina Krombholz. 2020. User Mental Models of Cryptocurrency Systems - A Grounded Theory Approach. (Aug. 2020), 341--358. https:\/\/www.usenix.org\/conference\/soups2020\/presentation\/mai"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03168-7_3"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359174"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2007.41"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.14763\/2014.2.283"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1177\/1541931213601249"},{"key":"e_1_3_2_1_49_1","unstructured":"Chaya Nayak. 2020. New privacy-protected Facebook data for independent research on social media's impact on democracy. https:\/\/research.fb.com\/blog\/2020\/02\/new-privacy-protected-facebook-data-for-independent-research-on-social-medias-impact-on-democracy\/."},{"key":"e_1_3_2_1_50_1","volume-title":"Enigma 2018 (Enigma","author":"Near Joe","year":"2018","unstructured":"Joe Near. 2018. Differential Privacy at Scale: Uber and Berkeley Collaboration. In Enigma 2018 (Enigma 2018). USENIX Association, Santa Clara, CA. https:\/\/www.usenix.org\/node\/208168"},{"key":"e_1_3_2_1_51_1","first-page":"119","article-title":"Privacy as contextual integrity","volume":"79","author":"Nissenbaum Helen","year":"2004","unstructured":"Helen Nissenbaum. 2004. Privacy as contextual integrity. Wash. L. Rev., Vol. 79 (2004), 119.","journal-title":"Wash. L. Rev."},{"key":"e_1_3_2_1_52_1","volume-title":"Differential Privacy: A Primer for a Non-technical Audience. URL https:\/\/privacytools.seas.harvard.edu\/files\/privacytools\/files\/pedagogical-document-dp_0.pdf.","author":"Nissim Kobbi","year":"2017","unstructured":"Kobbi Nissim, Thomas Steinke, Alexandra Wood, Mark Bun, Marco Gaboardi, David R. O'Brien, and Salil Vadhan. 2017. Differential Privacy: A Primer for a Non-technical Audience. URL https:\/\/privacytools.seas.harvard.edu\/files\/privacytools\/files\/pedagogical-document-dp_0.pdf."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1098\/rsta.2017.0358"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1162\/99608f92.63a22079"},{"key":"e_1_3_2_1_55_1","volume-title":"Reputation as a sufficient condition for data quality on Amazon Mechanical Turk. Behavior research methods","author":"Peer Eyal","year":"2014","unstructured":"Eyal Peer, Joachim Vosgerau, and Alessandro Acquisti. 2014. Reputation as a sufficient condition for data quality on Amazon Mechanical Turk. Behavior research methods, Vol. 46, 4 (2014), 1023--1031."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v12i1.14997"},{"key":"e_1_3_2_1_57_1","unstructured":"Elissa M Redmiles Yasemin Acar Sascha Fahl and Michelle L Mazurek. 2017a. A summary of survey methodology best practices for security and privacy researchers. Technical Report."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025673"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00014"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174122"},{"key":"e_1_3_2_1_61_1","unstructured":"Norman Sadeh Alessandro Acquisti Travis D Breaux Lorrie Faith Cranor Aleecia M McDonald Joel R Reidenberg Noah A Smith Fei Liu N Cameron Russell Florian Schaub et al. 2013. The Usable Privacy Policy Project: Combining Crowdsourcing. Machine Learning and Natural Language Processing to Semi-Automatically Answer Those Privacy Questions Users Care About. Carnegie Mellon University Technical Report Carnegie Mellon University-ISR-13--119 (2013) 1--24."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.75"},{"key":"e_1_3_2_1_63_1","volume-title":"Designing Privacy for You: A Practical Approach for User-Centric Privacy. In International Conference on Human Aspects of Information Security, Privacy, and Trust. Springer, Springer, 739--752","author":"Senarath Awanthika","year":"2017","unstructured":"Awanthika Senarath, Nalin AG Arachchilage, and Jill Slay. 2017. Designing Privacy for You: A Practical Approach for User-Centric Privacy. In International Conference on Human Aspects of Information Security, Privacy, and Trust. Springer, Springer, 739--752."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0039-6257(97)84044-1"},{"key":"e_1_3_2_1_65_1","volume-title":"Science","volume":"236","author":"Slovik Paul","year":"1987","unstructured":"Paul Slovik. 1987. Perception of risk. Science, Vol. 236, 4799 (1987), 280--285."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2008.88"},{"key":"e_1_3_2_1_67_1","unstructured":"Differential Privacy Team. 2017. Learning with Privacy at Scale. https:\/\/machinelearning.apple.com\/research\/learning-with-privacy-at-scale."},{"key":"e_1_3_2_1_68_1","volume-title":"Privacy Attitudes and Data Valuation Among Fitness Tracker Users","author":"Vitak Jessica","unstructured":"Jessica Vitak, Yuting Liao, Priya Kumar, Michael Zimmer, and Katherine Kritikos. 2018. Privacy Attitudes and Data Valuation Among Fitness Tracker Users. In Transforming Digital Worlds, Gobinda Chowdhury, Julie McLeod, Val Gillet, and Peter Willett (Eds.). Springer International Publishing, Cham, 229--239."},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00088"}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3485252","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3485252","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3485252","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:54:18Z","timestamp":1763499258000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3485252"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":69,"alternative-id":["10.1145\/3460120.3485252","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3485252","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}