{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T21:48:53Z","timestamp":1776116933214,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":117,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T00:00:00Z","timestamp":1745539200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"INCIBE","award":["C063\/23"],"award-info":[{"award-number":["C063\/23"]}]},{"name":"Research Council of Finland","award":["345991,345992"],"award-info":[{"award-number":["345991,345992"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,4,26]]},"DOI":"10.1145\/3706598.3713540","type":"proceedings-article","created":{"date-parts":[[2025,4,28]],"date-time":"2025-04-28T14:15:52Z","timestamp":1745849752000},"page":"1-18","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Privacy Perceptions of Custom GPTs by Users and Creators"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7298-7762","authenticated-orcid":false,"given":"Rongjun","family":"Ma","sequence":"first","affiliation":[{"name":"Aalto University, Espoo, Finland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0573-4498","authenticated-orcid":false,"given":"Caterina","family":"Maidhof","sequence":"additional","affiliation":[{"name":"VRAIN, Universitat Polit\u00e8cnica de Val\u00e8ncia, Valencia, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-2094-8800","authenticated-orcid":false,"given":"Juan Carlos","family":"Carrillo","sequence":"additional","affiliation":[{"name":"VRAIN, Universitat Polit\u00e8cnica de Val\u00e8ncia, Valencia, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8659-2283","authenticated-orcid":false,"given":"Janne","family":"Lindqvist","sequence":"additional","affiliation":[{"name":"Aalto University, Espoo, Finland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6041-178X","authenticated-orcid":false,"given":"Jose","family":"Such","sequence":"additional","affiliation":[{"name":"King's College London, London, United Kingdom and VRAIN, Universitat Polit\u00e8cnica de Val\u00e8ncia, Valencia, Spain"}]}],"member":"320","published-online":{"date-parts":[[2025,4,25]]},"reference":[{"key":"e_1_3_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.25"},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"publisher","unstructured":"Alessandro Acquisti Idris Adjerid Rebecca Balebako Laura Brandimarte Lorrie\u00a0Faith Cranor Saranga Komanduri Pedro\u00a0Giovanni Leon Norman Sadeh Florian Schaub Manya Sleeper Yang Wang and Shomir Wilson. 2017. Nudges for Privacy and Security: Understanding and Assisting Users\u2019 Choices Online. ACM Comput. Surv. 50 3 Article 44 (aug 2017) 41\u00a0pages. 10.1145\/3054926","DOI":"10.1145\/3054926"},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1201\/9781420052183.ch18"},{"key":"e_1_3_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335438"},{"key":"e_1_3_3_2_6_2","unstructured":"Lana Aljuaid. 2024. ChatGPT - Personal Color Analysis. https:\/\/chat.openai.com\/g\/g-35kDoPvW7-personal-color-analysis. (Accessed on 03\/27\/2024)."},{"key":"e_1_3_3_2_7_2","unstructured":"NAIF\u00a0J ALOTAIBI. 2024. ChatGPT - image generator. https:\/\/chat.openai.com\/g\/g-pmuQfob8d-image-generator. (Accessed on 03\/27\/2024)."},{"key":"e_1_3_3_2_8_2","first-page":"3","volume-title":"Man-Environment Interactions: Evaluations and Applications: Part 2","author":"Altman Irwin","year":"1974","unstructured":"Irwin Altman. 1974. Privacy: A Conceptual Analysis. In Man-Environment Interactions: Evaluations and Applications: Part 2, D.\u00a0H. Carson (Ed.). Environmental Design Research Association, Washington, DC, USA, 3\u201328."},{"key":"e_1_3_3_2_9_2","first-page":"985","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Andow Benjamin","year":"2020","unstructured":"Benjamin Andow, Samin\u00a0Yaseer Mahmud, Justin Whitaker, William Enck, Bradley Reaves, Kapil Singh, and Serge Egelman. 2020. Actions speak louder than words:{ Entity-Sensitive} privacy policy and data flow analysis with { PoliCheck}. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, Boston, MA, USA, 985\u20131002."},{"key":"e_1_3_3_2_10_2","unstructured":"Sagiv Antebi Noam Azulay Edan Habler Ben Ganon Asaf Shabtai and Yuval Elovici. 2024. GPT in Sheep\u2019s Clothing: The Risk of Customized GPTs. arxiv:https:\/\/arXiv.org\/abs\/2401.09075"},{"key":"e_1_3_3_2_11_2","unstructured":"Atlas. 2024. ATLAS.ti | The #1 Software for Qualitative Data Analysis - ATLAS.ti. https:\/\/atlasti.com\/. (Accessed on 11\/27\/2024)."},{"key":"e_1_3_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2014.23006"},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"publisher","unstructured":"Gaurav Bansal Fatemeh\u00a0\u201cMariam\u201d Zahedi and David Gefen. 2010. The impact of personal dispositions on information sensitivity privacy concern and trust in disclosing health information online. Decision Support Systems 49 2 (2010) 138\u2013150. 10.1016\/j.dss.2010.01.010","DOI":"10.1016\/j.dss.2010.01.010"},{"key":"e_1_3_3_2_14_2","first-page":"417","volume-title":"Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020)","author":"Barbosa Nat\u00e3\u00a0M.","year":"2020","unstructured":"Nat\u00e3\u00a0M. Barbosa, Zhuohao Zhang, and Yang Wang. 2020. Do Privacy and Security Matter to Everyone? Quantifying and Clustering User-Centric Considerations About Smart Home Device Adoption. In Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020). USENIX Association, Virtual Event, 417\u2013435. https:\/\/www.usenix.org\/conference\/soups2020\/presentation\/barbosa"},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"publisher","unstructured":"Susanne Barth Dan Ionita and Pieter Hartel. 2022. Understanding Online Privacy\u2014A Systematic Review of Privacy Visualizations and Privacy by Design Guidelines. ACM Computing Surveys (CSUR) 55 3 Article 63 (feb 2022) 37\u00a0pages. 10.1145\/3502288","DOI":"10.1145\/3502288"},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/3600211.3604722"},{"key":"e_1_3_3_2_17_2","unstructured":"Wunderwuzzi\u2019s blog. 2023. Malicious ChatGPT Agents: How GPTs Can Quietly Grab Your Data (Demo) \u00b7 Embrace The Red. https:\/\/embracethered.com\/blog\/posts\/2023\/openai-custom-malware-gpt\/. (Accessed on 03\/27\/2024)."},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"crossref","unstructured":"Sophie\u00a0C Boerman Sanne Kruikemeier and Frederik\u00a0J Zuiderveen\u00a0Borgesius. 2021. Exploring motivations for online privacy protection behavior: Insights from panel data. Communication Research 48 7 (2021) 953\u2013977.","DOI":"10.1177\/0093650218800915"},{"key":"e_1_3_3_2_19_2","doi-asserted-by":"publisher","unstructured":"Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative Research in Psychology 3 2 (2006) 77\u2013101. 10.1191\/1478088706qp063oa arXiv:https:\/\/www.tandfonline.com\/doi\/pdf\/10.1191\/1478088706qp063oa","DOI":"10.1191\/1478088706qp063oa"},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"crossref","unstructured":"Canva. 2024. Canva: Visual Suite for Everyone. https:\/\/www.canva.com\/en_gb\/. (Accessed on 11\/25\/2024).","DOI":"10.3917\/rfeap.015.0011"},{"key":"e_1_3_3_2_21_2","unstructured":"Canva. 2024. ChatGPT - Canva. https:\/\/chat.openai.com\/g\/g-alKfVrz9K-canva. (Accessed on 03\/27\/2024)."},{"key":"e_1_3_3_2_22_2","first-page":"2633","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Carlini Nicholas","year":"2021","unstructured":"Nicholas Carlini, Florian Tram\u00e8r, Eric Wallace, Matthew Jagielski, Ariel Herbert-Voss, Katherine Lee, Adam Roberts, Tom Brown, Dawn Song, \u00dalfar Erlingsson, Alina Oprea, and Colin Raffel. 2021. Extracting Training Data from Large Language Models. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, Virtual Event, 2633\u20132650. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/carlini-extracting"},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"crossref","unstructured":"Hsuan-Ting Chen and Wenhong Chen. 2015. Couldn\u2019t or wouldn\u2019t? The influence of privacy concerns and self-efficacy in privacy management on privacy protection. Cyberpsychology Behavior and Social Networking 18 1 (2015) 13\u201319.","DOI":"10.1089\/cyber.2014.0456"},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335358"},{"key":"e_1_3_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/3334480.3383074"},{"key":"e_1_3_3_2_26_2","doi-asserted-by":"publisher","unstructured":"Hichang Cho Pengxiang Li and Zhang\u00a0Hao Goh. 2020. Privacy Risks Emotions and Social Media: A Coping Model of Online Privacy. ACM Trans. Comput.-Hum. Interact. 27 6 Article 40 (nov 2020) 28\u00a0pages. 10.1145\/3412367","DOI":"10.1145\/3412367"},{"key":"e_1_3_3_2_27_2","doi-asserted-by":"publisher","unstructured":"Hanbyul Choi Jonghwa Park and Yoonhyuk Jung. 2018. The role of privacy fatigue in online privacy behavior. Computers in Human Behavior 81 (2018) 42\u201351. 10.1016\/j.chb.2017.12.001","DOI":"10.1016\/j.chb.2017.12.001"},{"key":"e_1_3_3_2_28_2","first-page":"331","volume-title":"Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022)","author":"Colnago Jessica","year":"2022","unstructured":"Jessica Colnago, Lorrie\u00a0Faith Cranor, Alessandro Acquisti, and Kate\u00a0Hazel Stanton. 2022. Is it a concern or a preference? An investigation into the ability of privacy scales to capture and distinguish granular privacy constructs. In Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022). USENIX Association, Boston, MA, USA, 331\u2013346."},{"key":"e_1_3_3_2_29_2","unstructured":"Consensus. 2024. ChatGPT - Consensus. https:\/\/chat.openai.com\/g\/g-bo0FiWLY7-consensus. (Accessed on 03\/27\/2024)."},{"key":"e_1_3_3_2_30_2","doi-asserted-by":"publisher","unstructured":"Tamara Dinev and Paul Hart. 2006. An Extended Privacy Calculus Model for E-Commerce Transactions. Information Systems Research 17 1 (2006) 61\u201380. 10.1287\/isre.1060.0080","DOI":"10.1287\/isre.1060.0080"},{"key":"e_1_3_3_2_31_2","doi-asserted-by":"publisher","unstructured":"Yael Dubinsky Avi Yaeli and Alex Kofman. 2010. Effective management of roles and responsibilities: Driving accountability in software development teams. IBM Journal of Research and Development 54 2 (2010) 4\u20131. 10.1147\/JRD.2009.2039896","DOI":"10.1147\/JRD.2009.2039896"},{"key":"e_1_3_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"key":"e_1_3_3_2_33_2","first-page":"88","volume-title":"USENIX security symposium","author":"Felt Adrienne\u00a0Porter","year":"2011","unstructured":"Adrienne\u00a0Porter Felt, Helen\u00a0J Wang, Alexander Moshchuk, Steve Hanna, and Erika Chin. 2011. Permission re-delegation: Attacks and defenses.. In USENIX security symposium , Vol.\u00a030. USENIX Association, San Francisco, CA, USA, 88."},{"key":"e_1_3_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35659-9_14"},{"key":"e_1_3_3_2_35_2","doi-asserted-by":"publisher","unstructured":"Marco Furini Silvia Mirri Manuela Montangero and Catia Prandi. 2020. Privacy perception when using smartphone applications. Mobile Networks and Applications 25 (2020) 1055\u20131061. 10.1007\/s11036-020-01529-z","DOI":"10.1007\/s11036-020-01529-z"},{"key":"e_1_3_3_2_36_2","doi-asserted-by":"publisher","unstructured":"Patricia\u00a0I. Fusch and Lawrence\u00a0R. Ness. 2015. Are We There Yet? Data Saturation in Qualitative Research. The Qualitative Report 20 9 (2015) 1408\u20131416. 10.46743\/2160-3715\/2015.2281","DOI":"10.46743\/2160-3715\/2015.2281"},{"key":"e_1_3_3_2_37_2","first-page":"385","volume-title":"Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017)","author":"Gallagher Kevin","year":"2017","unstructured":"Kevin Gallagher, Sameer Patil, and Nasir Memon. 2017. New Me: Understanding Expert and Non-Expert Perceptions and Usage of the Tor Anonymity Network. In Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). USENIX Association, Santa Clara, CA, 385\u2013398. https:\/\/www.usenix.org\/conference\/soups2017\/technical-sessions\/presentation\/gallagher"},{"key":"e_1_3_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.1145\/2851581.2892413"},{"key":"e_1_3_3_2_39_2","doi-asserted-by":"publisher","unstructured":"Nina Gerber Paul Gerber and Melanie Volkamer. 2018. Explaining the Privacy Paradox: A Systematic Review of Literature Investigating Privacy Attitude and Behavior. Computers & Security 77 (2018) 226\u2013261. 10.1016\/j.cose.2018.04.002","DOI":"10.1016\/j.cose.2018.04.002"},{"key":"e_1_3_3_2_40_2","unstructured":"gptavern.mindgoblinstudios.com. 2024. ChatGPT - Grimoire. https:\/\/chat.openai.com\/g\/g-n7Rs0IK86-grimoire. (Accessed on 03\/27\/2024)."},{"key":"e_1_3_3_2_41_2","doi-asserted-by":"crossref","unstructured":"Syed H.\u00a0Akhter. 2014. Privacy concern and online transactions: the impact of internet self-efficacy and internet involvement. Journal of Consumer Marketing 31 2 (2014) 118\u2013125.","DOI":"10.1108\/JCM-06-2013-0606"},{"key":"e_1_3_3_2_42_2","volume-title":"Twelfth Symposium on Usable Privacy and Security (SOUPS 2016)","author":"Harkous Hamza","year":"2016","unstructured":"Hamza Harkous, Kassem Fawaz, Kang\u00a0G Shin, and Karl Aberer. 2016. PriBots: Conversational privacy with chatbots. In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016). USENIX Association, Denver, CO, USA, 6\u00a0pages."},{"key":"e_1_3_3_2_43_2","unstructured":"Xinyi Hou Yanjie Zhao and Haoyu Wang. 2024. On the (In)Security of LLM App Stores. arxiv:https:\/\/arXiv.org\/abs\/2407.08422Available at https:\/\/arxiv.org\/abs\/2407.08422."},{"key":"e_1_3_3_2_44_2","unstructured":"MixerBox Inc. 2024. ChatGPT - MixerBox Calendar. https:\/\/chat.openai.com\/g\/g-aI4P3mWio-mixerbox-calendar. (Accessed on 03\/28\/2024)."},{"key":"e_1_3_3_2_45_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-39540-7_3"},{"key":"e_1_3_3_2_46_2","unstructured":"Evin Jaff Yuhao Wu Ning Zhang and Umar Iqbal. 2024. Data Exposure from LLM Apps: An In-depth Investigation of OpenAI\u2019s GPTs. arxiv:https:\/\/arXiv.org\/abs\/2408.13247https:\/\/arxiv.org\/abs\/2408.13247"},{"key":"e_1_3_3_2_47_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642541"},{"key":"e_1_3_3_2_48_2","doi-asserted-by":"crossref","unstructured":"Adam\u00a0N Joinson Ulf-Dietrich Reips Tom Buchanan and Carina B\u00a0Paine Schofield. 2010. Privacy trust and self-disclosure online. Human\u2013Computer Interaction 25 1 (2010) 1\u201324.","DOI":"10.1080\/07370020903586662"},{"key":"e_1_3_3_2_49_2","unstructured":"Zhigang Kan Linbo Qiao Hao Yu Liwen Peng Yifu Gao and Dongsheng Li. 2023. Protecting User Privacy in Remote Conversational Systems: A Privacy-Preserving Framework Based on Text Sanitization. arxiv:https:\/\/arXiv.org\/abs\/2306.08223"},{"key":"e_1_3_3_2_50_2","first-page":"39","volume-title":"Eleventh Symposium On Usable Privacy and Security (SOUPS 2015)","author":"Kang Ruogu","year":"2015","unstructured":"Ruogu Kang, Laura Dabbish, Nathaniel Fruchter, and Sara Kiesler. 2015. \u201cMy Data Just Goes Everywhere:\u201d User Mental Models of the Internet and Implications for Privacy and Security. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015). USENIX Association, Ottawa, 39\u201352. https:\/\/www.usenix.org\/conference\/soups2015\/proceedings\/presentation\/kang"},{"key":"e_1_3_3_2_51_2","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753561"},{"key":"e_1_3_3_2_52_2","doi-asserted-by":"publisher","unstructured":"Nazish Khalid Adnan Qayyum Muhammad Bilal Ala Al-Fuqaha and Junaid Qadir. 2023. Privacy-preserving artificial intelligence in healthcare: Techniques and applications. Computers in Biology and Medicine 158 (2023) 106848. 10.1016\/j.compbiomed.2023.106848","DOI":"10.1016\/j.compbiomed.2023.106848"},{"key":"e_1_3_3_2_53_2","doi-asserted-by":"publisher","unstructured":"Bart\u00a0P. Knijnenburg Alfred Kobsa and Hongxia Jin. 2013. Dimensionality of Information Disclosure Behavior. International Journal of Human-Computer Studies 71 12 (2013) 1144\u20131162. 10.1016\/j.ijhcs.2013.06.003","DOI":"10.1016\/j.ijhcs.2013.06.003"},{"key":"e_1_3_3_2_54_2","doi-asserted-by":"publisher","DOI":"10.1145\/3611643.3613890"},{"key":"e_1_3_3_2_55_2","doi-asserted-by":"publisher","unstructured":"Spyros Kokolakis. 2017. Privacy Attitudes and Privacy Behaviour: A Review of Current Research on the Privacy Paradox Phenomenon. Computers & Security 64 (2017) 122\u2013134. 10.1016\/j.cose.2015.07.002","DOI":"10.1016\/j.cose.2015.07.002"},{"key":"e_1_3_3_2_56_2","doi-asserted-by":"crossref","unstructured":"Klaus Krippendorff. 2004. Reliability in content analysis: Some common misconceptions and recommendations. Human communication research 30 3 (2004) 411\u2013433.","DOI":"10.1093\/hcr\/30.3.411"},{"key":"e_1_3_3_2_57_2","volume-title":"GitHub Copilot AI is Leaking Functional API Keys","author":"Kulkarni Amit","year":"2021","unstructured":"Amit Kulkarni. 2021. GitHub Copilot AI is Leaking Functional API Keys. Analytics Drift. https:\/\/analyticsdrift.com\/github-copilot-ai-is-leaking-functional-api-keys\/ (Accessed on 08\/26\/2024)."},{"key":"e_1_3_3_2_58_2","doi-asserted-by":"crossref","unstructured":"J\u00a0Richard Landis and Gary\u00a0G Koch. 1977. The measurement of observer agreement for categorical data. biometrics 33 1 (1977) 159\u2013174.","DOI":"10.2307\/2529310"},{"key":"e_1_3_3_2_59_2","volume-title":"Stress, appraisal, and coping","author":"Lazarus Richard\u00a0S","year":"1984","unstructured":"Richard\u00a0S Lazarus. 1984. Stress, appraisal, and coping. Springer, New York, NY, USA."},{"key":"e_1_3_3_2_60_2","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780195069945.001.0001"},{"key":"e_1_3_3_2_61_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642116"},{"key":"e_1_3_3_2_62_2","first-page":"501","volume-title":"10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13)","author":"Lee Sangmin","year":"2013","unstructured":"Sangmin Lee, Edmund\u00a0L. Wong, Deepak Goel, Mike Dahlin, and Vitaly Shmatikov. 2013. \u03c0 Box: A Platform for Privacy-Preserving Apps. In 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13). USENIX Association, Lombard, IL, 501\u2013514. https:\/\/www.usenix.org\/conference\/nsdi13\/technical-sessions\/presentation\/lee_sangmin"},{"key":"e_1_3_3_2_63_2","doi-asserted-by":"publisher","unstructured":"Tianshi Li Elizabeth Louie Laura Dabbish and Jason\u00a0I. Hong. 2021. How Developers Talk About Personal Data and What It Means for User Privacy: A Case Study of a Developer Forum on Reddit. Proc. ACM Hum.-Comput. Interact. 4 CSCW3 Article 220 (jan 2021) 28\u00a0pages. 10.1145\/3432919","DOI":"10.1145\/3432919"},{"key":"e_1_3_3_2_64_2","doi-asserted-by":"publisher","unstructured":"Yuan Li. 2011. Empirical studies on online information privacy concerns: Literature review and an integrative framework. Communications of the Association for Information Systems 28 1 (2011) 28. 10.17705\/1CAIS.02828","DOI":"10.17705\/1CAIS.02828"},{"key":"e_1_3_3_2_65_2","unstructured":"Zi Liang Haibo Hu Qingqing Ye Yaxin Xiao and Haoyang Li. 2024. Why Are My Prompts Leaked? Unraveling Prompt Extraction Threats in Customized Large Language Models. arxiv:https:\/\/arXiv.org\/abs\/2408.02416https:\/\/arxiv.org\/abs\/2408.02416"},{"key":"e_1_3_3_2_66_2","doi-asserted-by":"publisher","DOI":"10.1145\/3278721.3278773"},{"key":"e_1_3_3_2_67_2","doi-asserted-by":"publisher","unstructured":"Nora McDonald Sarita Schoenebeck and Andrea Forte. 2019. Reliability and Inter-rater Reliability in Qualitative Research: Norms and Guidelines for CSCW and HCI Practice. Proc. ACM Hum.-Comput. Interact. 3 CSCW Article 72 (nov 2019) 23\u00a0pages. 10.1145\/3359174","DOI":"10.1145\/3359174"},{"key":"e_1_3_3_2_68_2","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380106"},{"key":"e_1_3_3_2_69_2","doi-asserted-by":"publisher","unstructured":"George\u00a0R. Milne George Pettinico Fatima\u00a0M. Hajjat and Ereni Markos. 2017. Information Sensitivity Typology: Mapping the Degree and Type of Risk Consumers Perceive in Personal Data Sharing. Journal of Consumer Affairs 51 1 (2017) 133\u2013161. 10.1111\/joca.12111","DOI":"10.1111\/joca.12111"},{"key":"e_1_3_3_2_70_2","volume-title":"Uncertainty: A guide to dealing with uncertainty in quantitative risk and policy analysis","author":"Morgan M.\u00a0Granger","year":"1992","unstructured":"M.\u00a0Granger Morgan and Max Henrion. 1992. Uncertainty: A guide to dealing with uncertainty in quantitative risk and policy analysis. Cambridge University Press, New York, NY."},{"key":"e_1_3_3_2_71_2","first-page":"329","volume-title":"Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018)","author":"Murillo Ambar","year":"2018","unstructured":"Ambar Murillo, Andreas Kramm, Sebastian Schnorf, and Alexander De\u00a0Luca. 2018. \" If I press delete, it\u2019s gone\"-User Understanding of Online Data Deletion and Expiration. In Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018). USENIX Association, Baltimore, MD, USA, 329\u2013339."},{"key":"e_1_3_3_2_72_2","unstructured":"Helen Nissenbaum. 2004. Privacy as contextual integrity. Wash. L. Rev. 79 (2004) 119."},{"key":"e_1_3_3_2_73_2","volume-title":"Privacy in Context: Technology, Policy, and the Integrity of Social Life","author":"Nissenbaum Helen","year":"2010","unstructured":"Helen Nissenbaum. 2010. Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford Law Books, Stanford, CA."},{"key":"e_1_3_3_2_74_2","doi-asserted-by":"publisher","unstructured":"Maggie Oates Yama Ahmadullah Abigail Marsh Chelse Swoopes Shikun Zhang Rebecca Balebako and Lorrie\u00a0Faith Cranor. 2018. Turtles locks and bathrooms: Understanding mental models of privacy through illustration. Proceedings on Privacy Enhancing Technologies 2018 4 (2018) 5\u201332. 10.1515\/popets-2018-0029","DOI":"10.1515\/popets-2018-0029"},{"key":"e_1_3_3_2_75_2","doi-asserted-by":"publisher","DOI":"10.1145\/1056808.1057073"},{"key":"e_1_3_3_2_76_2","unstructured":"OpenAI. 2023. Actions - OpenAI API. https:\/\/platform.openai.com\/docs\/actions\/introduction. (Accessed on 09\/02\/2024)."},{"key":"e_1_3_3_2_77_2","unstructured":"OpenAI. 2023. Explore GPTs. https:\/\/chatgpt.com\/gpts. (Accessed on 09\/07\/2024)."},{"key":"e_1_3_3_2_78_2","unstructured":"OpenAI. 2023. Introducing GPTs | OpenAI. https:\/\/openai.com\/index\/introducing-gpts\/. (Accessed on 11\/25\/2024)."},{"key":"e_1_3_3_2_79_2","volume-title":"Data Processing Addendum","year":"2024","unstructured":"OpenAI. 2024. Data Processing Addendum. OpenAI. https:\/\/openai.com\/policies\/data-processing-addendum\/ (Accessed on 05\/09\/2024)."},{"key":"e_1_3_3_2_80_2","unstructured":"OpenAI. 2024. EU privacy policy | OpenAI. https:\/\/openai.com\/policies\/privacy-policy\/. (Accessed on 11\/25\/2024)."},{"key":"e_1_3_3_2_81_2","unstructured":"OpenAI. 2024. GPT Action authentication - OpenAI API. https:\/\/platform.openai.com\/docs\/actions\/authentication. (Accessed on 11\/26\/2024)."},{"key":"e_1_3_3_2_82_2","unstructured":"OpenAI. 2024. GPTs Data Privacy FAQs | OpenAI Help Center. https:\/\/help.openai.com\/en\/articles\/8554402-gpts-data-privacy-faqs. (Accessed on 11\/25\/2024)."},{"key":"e_1_3_3_2_83_2","unstructured":"OpenAi. 2024. GPTs Data Privacy FAQs | OpenAI Help Center. https:\/\/help.openai.com\/en\/articles\/8554402-gpts-data-privacy-faqs. (Accessed on 11\/25\/2024)."},{"key":"e_1_3_3_2_84_2","unstructured":"OpenAI. 2024. Introducing the GPT Store. https:\/\/openai.com\/blog\/introducing-the-gpt-store. (Accessed on 03\/27\/2024)."},{"key":"e_1_3_3_2_85_2","volume-title":"Plugin Terms","year":"2024","unstructured":"OpenAI. 2024. Plugin Terms. OpenAI. https:\/\/openai.com\/policies\/plugin-terms\/ (Accessed on 05\/09\/2024)."},{"key":"e_1_3_3_2_86_2","volume-title":"People + AI Guidebook","author":"PAIR Google","year":"2019","unstructured":"Google PAIR. 2019. People + AI Guidebook. Google Research. https:\/\/design.google\/aiguidebook"},{"key":"e_1_3_3_2_87_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642732"},{"key":"e_1_3_3_2_88_2","volume-title":"The Emotional Chatbots Are Here to Probe Our Feelings","author":"Pardes Arielle","year":"2018","unstructured":"Arielle Pardes. 2018. The Emotional Chatbots Are Here to Probe Our Feelings. Cond\u00e9 Nast. https:\/\/www.wired.com\/story\/replika-open-source\/"},{"key":"e_1_3_3_2_89_2","unstructured":"pulsr.co.uk. 2024. ChatGPT - math. https:\/\/chat.openai.com\/g\/g-odWlfAKWM-math. (Accessed on 03\/27\/2024)."},{"key":"e_1_3_3_2_90_2","unstructured":"puzzle.today. 2024. ChatGPT - Write For Me. https:\/\/chat.openai.com\/g\/g-B3hgivKK9-write-for-me\/c\/42960e67-173a-46df-b0e2-1e97d5f6ed94. (Accessed on 03\/27\/2024)."},{"key":"e_1_3_3_2_91_2","doi-asserted-by":"publisher","unstructured":"Gerardo Ramirez and Sian\u00a0L. Beilock. 2011. Writing about testing worries boosts exam performance in the classroom. Science 331 6014 (2011) 211\u2013213. 10.1126\/science.1199427","DOI":"10.1126\/science.1199427"},{"key":"e_1_3_3_2_92_2","unstructured":"Michael Ryan. 2024. ChatGPT - Schedule Assistant. https:\/\/chat.openai.com\/g\/g-rk0wck8W0-schedule-assistant\/c\/321b124a-12c5-4173-b646-72eef5dc3391. (Accessed on 03\/28\/2024)."},{"key":"e_1_3_3_2_93_2","first-page":"1","volume-title":"Eleventh symposium on usable privacy and security (SOUPS 2015)","author":"Schaub Florian","year":"2015","unstructured":"Florian Schaub, Rebecca Balebako, Adam\u00a0L Durity, and Lorrie\u00a0Faith Cranor. 2015. A design space for effective privacy notices. In Eleventh symposium on usable privacy and security (SOUPS 2015). USENIX Association, Ottawa, Canada, 1\u201317."},{"key":"e_1_3_3_2_94_2","unstructured":"SEO.AI. 2024. GPT Store Statistics & Facts: Contains 159.000 of the 3 million created GPTs. https:\/\/seo.ai\/blog\/gpt-store-statistics-facts. (Accessed on 03\/27\/2024)."},{"key":"e_1_3_3_2_95_2","first-page":"5035","volume-title":"Proceedings of the 33rd USENIX Security Symposium (USENIX Security 2024)","author":"Seymour William","year":"2024","unstructured":"William Seymour, Noura Abdi, Kopo\u00a0M. Ramokapane, Jide Edu, Guillermo Suarez-Tangil, and Jose Such. 2024. Voice App Developer Experiences with Alexa and Google Assistant: Juggling Risks, Liability, and Security. In Proceedings of the 33rd USENIX Security Symposium (USENIX Security 2024). USENIX Association, Philadelphia, PA, USA, 5035\u20135052. https:\/\/arxiv.org\/abs\/2311.08879"},{"key":"e_1_3_3_2_96_2","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702586"},{"key":"e_1_3_3_2_97_2","doi-asserted-by":"publisher","unstructured":"Tanmay Singh Harshvardhan Aditya Vijay\u00a0K Madisetti and Arshdeep Bahga. 2024. Whispered tuning: Data privacy preservation in fine-tuning llms through differential privacy. Journal of Software Engineering and Applications 17 1 (2024) 1\u201322. 10.4236\/jsea.2024.171001.","DOI":"10.4236\/jsea.2024.171001"},{"key":"e_1_3_3_2_98_2","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884855"},{"key":"e_1_3_3_2_99_2","doi-asserted-by":"publisher","unstructured":"H\u00a0Jeff Smith Tamara Dinev and Heng Xu. 2011. Information privacy research: an interdisciplinary review. MIS quarterly 35 4 (2011) 989\u20131015. 10.2307\/41409970","DOI":"10.2307\/41409970"},{"key":"e_1_3_3_2_100_2","doi-asserted-by":"crossref","unstructured":"Daniel\u00a0J Solove. 2005. A taxonomy of privacy. U. Pa. l. Rev. 154 (2005) 477.","DOI":"10.2307\/40041279"},{"key":"e_1_3_3_2_101_2","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2212.03860"},{"key":"e_1_3_3_2_102_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376854"},{"key":"e_1_3_3_2_103_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581060"},{"key":"e_1_3_3_2_104_2","unstructured":"Guanhong Tao Siyuan Cheng Zhuo Zhang Junmin Zhu Guangyu Shen and Xiangyu Zhang. 2023. Opening A Pandora\u2019s Box: Things You Should Know in the Era of Custom GPTs. arXiv:https:\/\/arXiv.org\/abs\/2401.00905"},{"key":"e_1_3_3_2_105_2","first-page":"473","volume-title":"Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023)","author":"Usman Warda","year":"2023","unstructured":"Warda Usman, Jackie Hu, McKynlee Wilson, and Daniel Zappala. 2023. Distrust of big tech and a desire for privacy: Understanding the motivations of people who have voluntarily adopted secure email. In Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023). USENIX, Anaheim, California, USA, 473\u2013490."},{"key":"e_1_3_3_2_106_2","doi-asserted-by":"publisher","unstructured":"Evert Van\u00a0den Broeck Brahim Zarouali and Karolien Poels. 2019. Chatbot Advertising Effectiveness: When Does the Message Get Through? Computers in Human Behavior 98 (September 2019) 150\u2013157. 10.1016\/j.chb.2019.04.009","DOI":"10.1016\/j.chb.2019.04.009"},{"key":"e_1_3_3_2_107_2","doi-asserted-by":"publisher","unstructured":"Karl Van Der\u00a0Schyff Greg Foster Karen Renaud and Stephen Flowerday. 2023. Online privacy fatigue: a scoping review and research agenda. Future Internet 15 5 (2023) 164. 10.3390\/fi15050164","DOI":"10.3390\/fi15050164"},{"key":"e_1_3_3_2_108_2","doi-asserted-by":"crossref","unstructured":"Michael Veale Midas Nouwens and Cristiana Santos. 2022. Impossible asks: can the transparency and consent framework ever authorise real-time bidding after the Belgian DPA decision? Technology and Regulation 2022 (2022) 12\u201322. https:\/\/doi.org\/10.26116\/","DOI":"10.71265\/0ccteg67"},{"key":"e_1_3_3_2_109_2","unstructured":"Weiqi Wang Zhiyi Tian Chenhan Zhang and Shui Yu. 2024. Machine Unlearning: A Comprehensive Survey. arxiv:https:\/\/arXiv.org\/abs\/2405.07406Available at https:\/\/arxiv.org\/abs\/2405.07406."},{"key":"e_1_3_3_2_110_2","doi-asserted-by":"publisher","DOI":"10.1145\/3531146.3533088"},{"key":"e_1_3_3_2_111_2","volume-title":"Proceedings of the 33rd International Conference on Information Systems (ICIS)","author":"Xu Heng","year":"2012","unstructured":"Heng Xu, Sumeet Gupta, Mary\u00a0Beth Rosson, and John\u00a0M. Carroll. 2012. Measuring Mobile Users\u2019 Concerns for Information Privacy. In Proceedings of the 33rd International Conference on Information Systems (ICIS). Association for Information Systems, Orlando, FL, USA, 16\u00a0pages. https:\/\/aisel.aisnet.org\/icis2012\/proceedings\/ISSecurity\/10"},{"key":"e_1_3_3_2_112_2","doi-asserted-by":"crossref","unstructured":"Jie Xu Zihan Wu Cong Wang and Xiaohua Jia. 2024. Machine unlearning: Solutions and challenges. IEEE Transactions on Emerging Topics in Computational Intelligence 8 3 (2024) 2150\u20132168.","DOI":"10.1109\/TETCI.2024.3379240"},{"key":"e_1_3_3_2_113_2","doi-asserted-by":"publisher","unstructured":"Mike\u00a0Z Yao Ronald\u00a0E Rice and Kier Wallis. 2007. Predicting user concerns about online privacy. Journal of the American Society for Information Science and Technology 58 5 (2007) 710\u2013722. 10.1002\/asi.20530","DOI":"10.1002\/asi.20530"},{"key":"e_1_3_3_2_114_2","unstructured":"Jiahao Yu Yuhang Wu Dong Shu Mingyu Jin and Xinyu Xing. 2023. Assessing Prompt Injection Risks in 200+ Custom GPTs. arxiv:https:\/\/arXiv.org\/abs\/2311.11538Available at https:\/\/arxiv.org\/abs\/2311.11538."},{"key":"e_1_3_3_2_115_2","doi-asserted-by":"crossref","unstructured":"Haibo Zhang Toru Nakamura Takamasa Isohara and Kouichi Sakurai. 2023. A review on machine unlearning. SN Computer Science 4 4 (2023) 337.","DOI":"10.1007\/s42979-023-01767-4"},{"key":"e_1_3_3_2_116_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642385"},{"key":"e_1_3_3_2_117_2","unstructured":"Zejun Zhang Li Zhang Xin Yuan Anlan Zhang Mengwei Xu and Feng Qian. 2024. A First Look at GPT Apps: Landscape and Vulnerability. arxiv:https:\/\/arXiv.org\/abs\/2402.15105Available at https:\/\/arxiv.org\/abs\/2402.15105."},{"key":"e_1_3_3_2_118_2","unstructured":"JiaYing Zheng HaiNan Zhang LingXiang Wang WangJie Qiu HongWei Zheng and ZhiMing Zheng. 2024. Safely Learning with Private Data: A Federated Learning Framework for Large Language Model. arxiv:https:\/\/arXiv.org\/abs\/2406.14898Available at https:\/\/arxiv.org\/abs\/2406.14898."}],"event":{"name":"CHI 2025: CHI Conference on Human Factors in Computing Systems","location":"Yokohama Japan","acronym":"CHI '25","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2025 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706598.3713540","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3706598.3713540","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T05:40:10Z","timestamp":1751607610000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706598.3713540"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,25]]},"references-count":117,"alternative-id":["10.1145\/3706598.3713540","10.1145\/3706598"],"URL":"https:\/\/doi.org\/10.1145\/3706598.3713540","relation":{},"subject":[],"published":{"date-parts":[[2025,4,25]]},"assertion":[{"value":"2025-04-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}