{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T07:15:07Z","timestamp":1758266107268,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T00:00:00Z","timestamp":1633910400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100003077","name":"Knowledge Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100003077","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100010661","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","award":["786767"],"award-info":[{"award-number":["786767"]}],"id":[{"id":"10.13039\/100010661","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,10,11]]},"DOI":"10.1145\/3481357.3481525","type":"proceedings-article","created":{"date-parts":[[2021,12,11]],"date-time":"2021-12-11T21:05:52Z","timestamp":1639256752000},"page":"29-35","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Vision: A Noisy Picture or a Picker Wheel to Spin? Exploring Suitable Metaphors for Differentially Private Data Analyses"],"prefix":"10.1145","author":[{"given":"Farzaneh","family":"Karegar","sequence":"first","affiliation":[{"name":"Karlstad University, Sweden"}]},{"given":"Simone","family":"Fischer-H\u00fcbner","sequence":"additional","affiliation":[{"name":"Karlstad University, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2021,12,11]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"A framework for engineering metaphor at the user interface. Interacting with computers 13, 2","author":"Alty L.","year":"2000","unstructured":"James\u00a0 L. Alty , Roger\u00a0 P. Knott , Ben Anderson , and Michael Smyth . 2000. A framework for engineering metaphor at the user interface. Interacting with computers 13, 2 ( 2000 ), 301\u2013322. James\u00a0L. Alty, Roger\u00a0P. Knott, Ben Anderson, and Michael Smyth. 2000. A framework for engineering metaphor at the user interface. Interacting with computers 13, 2 (2000), 301\u2013322."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Brooke Bullek Stephanie Garboski Darakhshan\u00a0J. Mir and Evan\u00a0M. Peck. 2017. Towards Understanding Differential Privacy: When Do People Trust Randomized Response Technique?ACM 3833\u20133837.  Brooke Bullek Stephanie Garboski Darakhshan\u00a0J. Mir and Evan\u00a0M. Peck. 2017. Towards Understanding Differential Privacy: When Do People Trust Randomized Response Technique?ACM 3833\u20133837.","DOI":"10.1145\/3025453.3025698"},{"volume-title":"People and Computers XII, Harold Thimbleby, Brid O\u2019Conaill, and Peter\u00a0J. Thomas(Eds.)","author":"Clark Louise","key":"e_1_3_2_1_3_1","unstructured":"Louise Clark and M.\u00a0 Angela Sasse . 1997. Conceptual Design Reconsidered: The Case of the Internet Session Directory Tool . In People and Computers XII, Harold Thimbleby, Brid O\u2019Conaill, and Peter\u00a0J. Thomas(Eds.) . Springer , 67\u201384. Louise Clark and M.\u00a0Angela Sasse. 1997. Conceptual Design Reconsidered: The Case of the Internet Session Directory Tool. In People and Computers XII, Harold Thimbleby, Brid O\u2019Conaill, and Peter\u00a0J. Thomas(Eds.). Springer, 67\u201384."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2018.23015"},{"key":"e_1_3_2_1_5_1","volume-title":"Learning with Privacy at Scale. https:\/\/docs-assets.developer.apple.com\/ml-research\/papers\/learning-with-privacy-at-scale.pdf [Online","author":"Privacy\u00a0Team Apple Differential","year":"2021","unstructured":"Apple Differential Privacy\u00a0Team . 2017. Learning with Privacy at Scale. https:\/\/docs-assets.developer.apple.com\/ml-research\/papers\/learning-with-privacy-at-scale.pdf [Online ; accessed 1- June - 2021 ]. Apple Differential Privacy\u00a0Team. 2017. Learning with Privacy at Scale. https:\/\/docs-assets.developer.apple.com\/ml-research\/papers\/learning-with-privacy-at-scale.pdf [Online; accessed 1-June-2021]."},{"volume-title":"Differential Privacy","author":"Dwork Cynthia","key":"e_1_3_2_1_6_1","unstructured":"Cynthia Dwork . 2006. Differential Privacy . In Automata, Languages and Programming, Michele Bugliesi, Bart Preneel, Vladimiro Sassone, and Ingo Wegener (Eds.). Springer , 1\u201312. Cynthia Dwork. 2006. Differential Privacy. In Automata, Languages and Programming, Michele Bugliesi, Bart Preneel, Vladimiro Sassone, and Ingo Wegener (Eds.). Springer, 1\u201312."},{"volume-title":"Theory of cryptography conference","author":"Dwork Cynthia","key":"e_1_3_2_1_7_1","unstructured":"Cynthia Dwork , Frank McSherry , Kobbi Nissim , and Adam Smith . 2006. Calibrating noise to sensitivity in private data analysis . In Theory of cryptography conference . Springer , 265\u2013284. Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. 2006. Calibrating noise to sensitivity in private data analysis. In Theory of cryptography conference. Springer, 265\u2013284."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1080\/07351690802246890"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1965.10480775"},{"key":"e_1_3_2_1_10_1","volume-title":"Towards Effective Differential Privacy Communication for Users\u2019 Data Sharing Decision and Comprehension. In 2020 IEEE Symposium on Security and Privacy (SP). IEEE, 392\u2013410","author":"Xiong Aiping","year":"2020","unstructured":"Aiping Xiong , Tianhao Wang , Ninghui Li , and Somesh Jha . 2020 . Towards Effective Differential Privacy Communication for Users\u2019 Data Sharing Decision and Comprehension. In 2020 IEEE Symposium on Security and Privacy (SP). IEEE, 392\u2013410 . Aiping Xiong, Tianhao Wang, Ninghui Li, and Somesh Jha. 2020. Towards Effective Differential Privacy Communication for Users\u2019 Data Sharing Decision and Comprehension. In 2020 IEEE Symposium on Security and Privacy (SP). IEEE, 392\u2013410."}],"event":{"name":"EuroUSEC '21: European Symposium on Usable Security 2021","acronym":"EuroUSEC '21","location":"Karlsruhe Germany"},"container-title":["Proceedings of the 2021 European Symposium on Usable Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3481357.3481525","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3481357.3481525","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:32Z","timestamp":1750191452000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3481357.3481525"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,11]]},"references-count":10,"alternative-id":["10.1145\/3481357.3481525","10.1145\/3481357"],"URL":"https:\/\/doi.org\/10.1145\/3481357.3481525","relation":{},"subject":[],"published":{"date-parts":[[2021,10,11]]},"assertion":[{"value":"2021-12-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}