{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,4]],"date-time":"2026-03-04T17:20:11Z","timestamp":1772644811551,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T00:00:00Z","timestamp":1710201600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"New York University Information Law Institute","award":["Fellows program"],"award-info":[{"award-number":["Fellows program"]}]},{"DOI":"10.13039\/501100006374","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1942772, 2131532, and 2131532"],"award-info":[{"award-number":["CNS-1942772, 2131532, and 2131532"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006374","name":"Columbia University","doi-asserted-by":"publisher","award":["Early Career Faculty Impact Fellowship"],"award-info":[{"award-number":["Early Career Faculty Impact Fellowship"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,3,12]]},"DOI":"10.1145\/3614407.3643702","type":"proceedings-article","created":{"date-parts":[[2024,2,26]],"date-time":"2024-02-26T06:21:52Z","timestamp":1708928512000},"page":"9-15","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Integrating Differential Privacy and Contextual Integrity"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1789-5109","authenticated-orcid":false,"given":"Sebastian","family":"Benthall","sequence":"first","affiliation":[{"name":"New York University School of Law"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1196-1515","authenticated-orcid":false,"given":"Rachel","family":"Cummings","sequence":"additional","affiliation":[{"name":"Columbia University"}]}],"member":"320","published-online":{"date-parts":[[2024,3,12]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Constitution of the United States 1787."},{"key":"e_1_3_2_1_2_1","first-page":"13","author":"Code U.S.","year":"1954","unstructured":"U.S. Code: Title 13, 1954.","journal-title":"Title"},{"key":"e_1_3_2_1_3_1","unstructured":"John Abowd. Second declaration of John M. Abowd Fair Lines versus US Dept. of Commerce Appendix B - 2010 reconstruction-abetted re-identification simulated attack. URL https:\/\/www2.census.gov\/about\/policies\/foia\/records\/disclosure-avoidance\/appendix-b-summary-of-simulated-reconstruction-abetted-re-identification-attack.pdf."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314058.3314066"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/3203475"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132769"},{"key":"e_1_3_2_1_7_1","volume-title":"Harvard Data Science Review","author":"Sarathy Jayshree","year":"2022","unstructured":"danah boyd and Jayshree Sarathy. Differential perspectives: Epistemic disconnects surrounding the US Census Bureau's use of differential privacy. Harvard Data Science Review, 2022. Forthcoming."},{"key":"e_1_3_2_1_8_1","volume-title":"94-171 Redistricting Data","author":"US Census Bureau","year":"2021","unstructured":"US Census Bureau. Decennial Census P.L. 94-171 Redistricting Data, 2021. URL https:\/\/www.census.gov\/programs-surveys\/decennial-census\/about\/rdo\/summary-files.html."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MTS.2009.934142"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833668"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPS-ISA58951.2023.00024"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3485252"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3580507.3597778"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/11681878_14"},{"key":"e_1_3_2_1_15_1","volume-title":"Differential privacy in practice: Expose your epsilons! Journal of Privacy and Confidentiality, 9(2):1--22","author":"Dwork Cynthia","year":"2019","unstructured":"Cynthia Dwork, Nitin Kohli, and Deirdre Mulligan. Differential privacy in practice: Expose your epsilons! Journal of Privacy and Confidentiality, 9(2):1--22, 2019."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3291276.3295691"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1137\/090756090"},{"key":"e_1_3_2_1_18_1","volume-title":"What's driving conflicts around differential privacy for the US Census","author":"Nanayakkara Priyanka","year":"2022","unstructured":"Priyanka Nanayakkara and Jessica Hullman. What's driving conflicts around differential privacy for the US Census. IEEE Security & Privacy, (01):2--11, 2022."},{"key":"e_1_3_2_1_19_1","first-page":"1613","volume-title":"Proceedings of the 32nd USENIX Security Symposium, USENIX Security '23","author":"Nanayakkara Priyanka","year":"2023","unstructured":"Priyanka Nanayakkara, Mary Anne Smart, Rachel Cummings, Gabriel Kaptchuk, and Elissa M Redmiles. What are the chances? Explaining the epsilon parameter in differential privacy. In Proceedings of the 32nd USENIX Security Symposium, USENIX Security '23, pages 1613--1630, 2023."},{"key":"e_1_3_2_1_20_1","first-page":"119","article-title":"Privacy as contextual integrity","volume":"79","author":"Nissenbaum Helen","year":"2004","unstructured":"Helen Nissenbaum. Privacy as contextual integrity. Washington Law Review, 79:119, 2004.","journal-title":"Washington Law Review"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1515\/9780804772891"},{"key":"e_1_3_2_1_22_1","first-page":"285","article-title":"The conduit metaphor","volume":"2","author":"Reddy Michael","year":"1979","unstructured":"Michael Reddy. The conduit metaphor. Metaphor and thought, 2:285--324, 1979.","journal-title":"Metaphor and thought"},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of the ACM CHI Conference on Human Factors in Computing Systems, CHI '23","author":"Sarathy Jayshree","year":"2023","unstructured":"Jayshree Sarathy, Sophia Song, Audrey Haque, Tania Schlatter, and Salil Vadhan. Dont look at the data! How differential privacy reconfigures the practices of data science. In Proceedings of the ACM CHI Conference on Human Factors in Computing Systems, CHI '23, 2023."},{"key":"e_1_3_2_1_24_1","volume-title":"Models matter: Setting accurate privacy expectations for local and central differential privacy","author":"Smart Mary Anne","year":"2023","unstructured":"Mary Anne Smart, Priyanka Nanayakkara, Rachel Cummings, Gabriel Kaptchuk, and Elissa M Redmiles. Models matter: Setting accurate privacy expectations for local and central differential privacy, 2023. Working paper."},{"key":"e_1_3_2_1_25_1","volume-title":"Privacy loss in Apple's implementation of differential privacy on MacOS 10.12. arXiv preprint arXiv:1709.02753","author":"Tang Jun","year":"2017","unstructured":"Jun Tang, Aleksandra Korolova, Xiaolong Bai, Xueqiang Wang, and Xiaofeng Wang. Privacy loss in Apple's implementation of differential privacy on MacOS 10.12. arXiv preprint arXiv:1709.02753, 2017."},{"key":"e_1_3_2_1_26_1","volume-title":"Group privacy: New challenges of data technologies","author":"Taylor Linnet","year":"2016","unstructured":"Linnet Taylor, Luciano Floridi, and Bart Van der Sloot. Group privacy: New challenges of data technologies, volume 126. Springer, 2016."},{"key":"e_1_3_2_1_27_1","first-page":"573","article-title":"A relational theory of data governance","volume":"131","author":"Viljoen Salome","year":"2021","unstructured":"Salome Viljoen. A relational theory of data governance. Yale Law Journal, 131:573, 2021.","journal-title":"Yale Law Journal"}],"event":{"name":"CSLAW '24: Symposium on Computer Science and Law","location":"Boston MA USA","acronym":"CSLAW '24","sponsor":["ACM Association for Computing Machinery"]},"container-title":["Proceedings of the Symposium on Computer Science and Law"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3614407.3643702","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3614407.3643702","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T19:38:51Z","timestamp":1756237131000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3614407.3643702"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,12]]},"references-count":27,"alternative-id":["10.1145\/3614407.3643702","10.1145\/3614407"],"URL":"https:\/\/doi.org\/10.1145\/3614407.3643702","relation":{},"subject":[],"published":{"date-parts":[[2024,3,12]]},"assertion":[{"value":"2024-03-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}