{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T21:44:48Z","timestamp":1776116688434,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,11]],"date-time":"2024-05-11T00:00:00Z","timestamp":1715385600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,11]]},"DOI":"10.1145\/3613905.3643983","type":"proceedings-article","created":{"date-parts":[[2024,5,11]],"date-time":"2024-05-11T08:15:21Z","timestamp":1715415321000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":24,"title":["Human-Centered Privacy Research in the Age of Large Language Models"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0877-5727","authenticated-orcid":false,"given":"Tianshi","family":"Li","sequence":"first","affiliation":[{"name":"Khoury College of Computer Sciences, Northeastern University, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9073-8054","authenticated-orcid":false,"given":"Sauvik","family":"Das","sequence":"additional","affiliation":[{"name":"Human-Computer Interaction Institute, Carnegie Mellon University, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8063-1034","authenticated-orcid":false,"given":"Hao-Ping (Hank)","family":"Lee","sequence":"additional","affiliation":[{"name":"Human-Computer Interaction Institute, Carnegie Mellon University, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9371-9441","authenticated-orcid":false,"given":"Dakuo","family":"Wang","sequence":"additional","affiliation":[{"name":"Northeastern University, United States"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-8329-4610","authenticated-orcid":false,"given":"Bingsheng","family":"Yao","sequence":"additional","affiliation":[{"name":"Computer Science, Rensselaer Polytechnic Institute, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6794-0054","authenticated-orcid":false,"given":"Zhiping","family":"Zhang","sequence":"additional","affiliation":[{"name":"Khoury College of Computer Sciences, Northeastern University, United States"}]}],"member":"320","published-online":{"date-parts":[[2024,5,11]]},"reference":[{"key":"e_1_3_3_1_1_1","doi-asserted-by":"publisher","unstructured":"Owura Asare Meiyappan Nagappan and N. Asokan. 2023. Is GitHub\u2019s Copilot as bad as humans at introducing vulnerabilities in code?Empirical Software Engineering 28 6 (September 2023). https:\/\/doi.org\/10.1007\/s10664-023-10380-1","DOI":"10.1007\/s10664-023-10380-1"},{"key":"e_1_3_3_1_2_1","volume-title":"Quantifying memorization across neural language models. arXiv preprint arXiv:2202.07646","author":"Carlini Nicholas","year":"2022","unstructured":"Nicholas Carlini, Daphne Ippolito, Matthew Jagielski, Katherine Lee, Florian Tramer, and Chiyuan Zhang. 2022. Quantifying memorization across neural language models. arXiv preprint arXiv:2202.07646 (2022)."},{"key":"e_1_3_3_1_3_1","volume-title":"USENIX Security Symposium, Vol.\u00a06.","author":"Carlini Nicholas","year":"2021","unstructured":"Nicholas Carlini, Florian Tramer, Eric Wallace, Matthew Jagielski, Ariel Herbert-Voss, Katherine Lee, Adam Roberts, Tom\u00a0B Brown, Dawn Song, Ulfar Erlingsson, 2021. Extracting Training Data from Large Language Models.. In USENIX Security Symposium, Vol.\u00a06."},{"key":"e_1_3_3_1_4_1","volume-title":"Can Language Models be Instructed to Protect Personal Information?arXiv preprint arXiv:2310.02224","author":"Chen Yang","year":"2023","unstructured":"Yang Chen, Ethan Mendes, Sauvik Das, Wei Xu, and Alan Ritter. 2023. Can Language Models be Instructed to Protect Personal Information?arXiv preprint arXiv:2310.02224 (2023)."},{"key":"e_1_3_3_1_5_1","unstructured":"Sheryl Estrada. 2023. A startup CFO used ChatGPT to build an FP&A tool\u2014here\u2019s how it went. https:\/\/fortune.com\/2023\/03\/01\/startup-cfo-chatgpt-finance-tool\/ Accessed: 09\/11\/2023."},{"key":"e_1_3_3_1_6_1","unstructured":"Pedro Ferreira. 2023. Can ChatGPT Improve Technical Analysis and Trading Techniques?https:\/\/www.financemagnates.com\/trending\/can-chatgpt-improve-technical-analysis-and-trading-techniques\/ Accessed: 09\/11\/2023."},{"key":"e_1_3_3_1_7_1","unstructured":"Thomas Germain. 2023. A Mental Health App Tested ChatGPT on Its Users. The Founder Said Backlash Was Just a Misunderstanding.https:\/\/gizmodo.com\/mental-health-therapy-app-ai-koko-chatgpt-rob-morris-1849965534\/ Accessed: 09\/11\/2023."},{"key":"e_1_3_3_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-39540-7_3"},{"key":"e_1_3_3_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2011.09.006"},{"key":"e_1_3_3_1_10_1","unstructured":"Daniel Kimmel. 2023. ChatGPT Therapy Is Good But It Misses What Makes Us Human. https:\/\/www.columbiapsychiatry.org\/news\/chatgpt-therapy-is-good-but-it-misses-what-makes-us-human. Accessed: 09\/11\/2023."},{"key":"e_1_3_3_1_11_1","volume-title":"Google","author":"Leonard Andrew","year":"2023","unstructured":"Andrew Leonard. 2023. \u2018Dr. Google\u2019 meets its match: Dr. ChatGPT. https:\/\/www.latimes.com\/science\/story\/2023-09-08\/dr-google-meets-its-match-dr-chatgpt Accessed: 09\/11\/2023."},{"key":"e_1_3_3_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287056"},{"key":"e_1_3_3_1_13_1","volume-title":"Can LLMs Keep a Secret? Testing Privacy Implications of Language Models via Contextual Integrity Theory. arXiv preprint arXiv:2310.17884","author":"Mireshghallah Niloofar","year":"2023","unstructured":"Niloofar Mireshghallah, Hyunwoo Kim, Xuhui Zhou, Yulia Tsvetkov, Maarten Sap, Reza Shokri, and Yejin Choi. 2023. Can LLMs Keep a Secret? Testing Privacy Implications of Language Models via Contextual Integrity Theory. arXiv preprint arXiv:2310.17884 (2023)."},{"key":"e_1_3_3_1_14_1","volume-title":"Scalable extraction of training data from (production) language models. arXiv preprint arXiv:2311.17035","author":"Nasr Milad","year":"2023","unstructured":"Milad Nasr, Nicholas Carlini, Jonathan Hayase, Matthew Jagielski, A\u00a0Feder Cooper, Daphne Ippolito, Christopher\u00a0A Choquette-Choo, Eric Wallace, Florian Tram\u00e8r, and Katherine Lee. 2023. Scalable extraction of training data from (production) language models. arXiv preprint arXiv:2311.17035 (2023)."},{"key":"e_1_3_3_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/sp46214.2022.9833571"},{"key":"e_1_3_3_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3539597.3575792"},{"key":"e_1_3_3_1_17_1","volume-title":"Beyond memorization: Violating privacy via inference with large language models. arXiv preprint arXiv:2310.07298","author":"Staab Robin","year":"2023","unstructured":"Robin Staab, Mark Vero, Mislav Balunovi\u0107, and Martin Vechev. 2023. Beyond memorization: Violating privacy via inference with large language models. arXiv preprint arXiv:2310.07298 (2023)."},{"key":"e_1_3_3_1_18_1","unstructured":"Mikhail Taver. 2023. ChatGPT is Coming to Finance So Let\u2019s Talk About the Risks and Rewards. https:\/\/www.unite.ai\/chatgpt-is-coming-to-finance-so-lets-talk-about-the-risks-and-rewards\/. Accessed: 09\/11\/2023."},{"key":"e_1_3_3_1_19_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2306.09649"},{"key":"e_1_3_3_1_20_1","volume-title":"Counterfactual memorization in neural language models. arXiv preprint arXiv:2112.12938","author":"Zhang Chiyuan","year":"2021","unstructured":"Chiyuan Zhang, Daphne Ippolito, Katherine Lee, Matthew Jagielski, Florian Tram\u00e8r, and Nicholas Carlini. 2021. Counterfactual memorization in neural language models. arXiv preprint arXiv:2112.12938 (2021)."},{"key":"e_1_3_3_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642385"}],"event":{"name":"CHI '24: CHI Conference on Human Factors in Computing Systems","location":"Honolulu HI USA","acronym":"CHI '24","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction","SIGACCESS ACM Special Interest Group on Accessible Computing"]},"container-title":["Extended Abstracts of the CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3613905.3643983","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3613905.3643983","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:44:33Z","timestamp":1750290273000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3613905.3643983"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,11]]},"references-count":21,"alternative-id":["10.1145\/3613905.3643983","10.1145\/3613905"],"URL":"https:\/\/doi.org\/10.1145\/3613905.3643983","relation":{},"subject":[],"published":{"date-parts":[[2024,5,11]]},"assertion":[{"value":"2024-05-11","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}