{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T14:37:27Z","timestamp":1776091047546,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":58,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T00:00:00Z","timestamp":1745539200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,4,26]]},"DOI":"10.1145\/3706598.3714136","type":"proceedings-article","created":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T04:45:58Z","timestamp":1745469958000},"page":"1-18","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Interaction Techniques for Providing Sensitive Location Data of Interpersonal Violence with User-Defined Privacy Preservation"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4756-6135","authenticated-orcid":false,"given":"Alex","family":"Godwin","sequence":"first","affiliation":[{"name":"Computer Science, American University, Washington, District of Columbia, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5265-9574","authenticated-orcid":false,"given":"Jasmine C","family":"Foriest","sequence":"additional","affiliation":[{"name":"School of Interactive Computing, Georgia Institute of Technology, Atlanta, Georgia, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0057-7646","authenticated-orcid":false,"given":"Mia","family":"Bottcher","sequence":"additional","affiliation":[{"name":"School of Medicine, Emory University, Atlanta, Georgia, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4749-1495","authenticated-orcid":false,"given":"Gretchen","family":"Baas","sequence":"additional","affiliation":[{"name":"Department of Criminology, Law, and Society, George Mason University, Fairfax, Virginia, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0754-1355","authenticated-orcid":false,"given":"Michael","family":"Tsai","sequence":"additional","affiliation":[{"name":"School of Medicine, Duke University, Durham, North Carolina, USA and University of Chicago, Chicago, Illinois, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2428-5659","authenticated-orcid":false,"given":"Daniel T","family":"Wu","sequence":"additional","affiliation":[{"name":"Emergency Medicine, Emory University School of Medicine, Atlanta, Georgia, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,4,25]]},"reference":[{"key":"e_1_3_3_2_2_2","unstructured":"Mark\u00a0S Ackerman and Scott\u00a0D Mainwaring. 2005. Privacy issues and human-computer interaction. Computer 27 5 (2005) 19\u201326."},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516735"},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2207727"},{"key":"e_1_3_3_2_5_2","first-page":"702","volume-title":"Interact","author":"Barkhuus Louise","year":"2003","unstructured":"Louise Barkhuus and Anind\u00a0K Dey. 2003. Location-Based Services for Mobile Telephony: a Study of Users\u2019 Privacy Concerns.. In Interact , Vol.\u00a03. Citeseer, 702\u2013712."},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"crossref","unstructured":"Richard\u00a0R Bennett and R\u00a0Bruce Wiegand. 1994. Observations on crime reporting in a developing nation. Criminology 32 1 (1994) 135\u2013148.","DOI":"10.1111\/j.1745-9125.1994.tb01149.x"},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"crossref","unstructured":"Alex Berke Robert Mahari Alex Pentland Kent Larson and Dana Calacci. 2024. Insights from an experiment crowdsourcing data from thousands of US Amazon users: The importance of transparency money and data use. Proceedings of the ACM on Human-Computer Interaction 8 CSCW2 (2024) 1\u201348.","DOI":"10.1145\/3687005"},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"crossref","unstructured":"Stacey\u00a0J Bosick Callie\u00a0Marie Rennison Angela\u00a0R Gover and Mary Dodge. 2012. Reporting violence to the police: Predictors through the life course. Journal of Criminal Justice 40 6 (2012) 441\u2013451.","DOI":"10.1016\/j.jcrimjus.2012.05.001"},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"crossref","unstructured":"Ben Bradford. 2014. Policing and social identity: Procedural justice inclusion and cooperation between police and public. Policing and society 24 1 (2014) 22\u201343.","DOI":"10.1080\/10439463.2012.724068"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"crossref","unstructured":"Robert Bridson. 2007. Fast Poisson disk sampling in arbitrary dimensions. SIGGRAPH sketches 10 1 (2007) 1.","DOI":"10.1145\/1278780.1278807"},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"crossref","unstructured":"Chris Brunsdon Stewart Fotheringham and Martin Charlton. 1998. Geographically weighted regression. Journal of the Royal Statistical Society: Series D (The Statistician) 47 3 (1998) 431\u2013443.","DOI":"10.1111\/1467-9884.00145"},{"key":"e_1_3_3_2_12_2","unstructured":"Centers for Disease Control and Prevention. 2023. Web-based Injury Statistics Query and Reporting System [WISQARS]. Violence-Related Deaths and Injury due to All Injury among Persons Aged All Ages Years 2018 to 2022 United States. Web-based Injury Statistics Query and Reporting System [WISQARS]. Last accessed: September 12 2024."},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/2984511.2984538"},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2012.16"},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"crossref","unstructured":"Michael Correll and Jeffrey Heer. 2016. Surprise! Bayesian weighting for de-biasing thematic maps. IEEE transactions on visualization and computer graphics 23 1 (2016) 651\u2013660.","DOI":"10.1109\/TVCG.2016.2598618"},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.5555\/1791834.1791836"},{"key":"e_1_3_3_2_17_2","volume-title":"Mapping crime: Understanding hotspots","author":"Eck John","year":"2005","unstructured":"John Eck, Spencer Chainey, James Cameron, and Ronald Wilson. 2005. Mapping crime: Understanding hotspots. Technical Report. National Institute of Justice."},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"crossref","unstructured":"Adam\u00a0D Fine Thiago\u00a0R Oliveira Jonathan Jackson Ben Bradford Rick Trinkner and Kriszti\u00e1n P\u00f3sch. 2024. Did the Murder of George Floyd Damage Public Perceptions of Police and Law in the United States? Journal of Research in Crime and Delinquency (2024) 00224278241263527.","DOI":"10.1177\/00224278241263527"},{"key":"e_1_3_3_2_19_2","doi-asserted-by":"crossref","unstructured":"Raphael\u00a0A Finkel and Jon\u00a0Louis Bentley. 1974. Quad trees a data structure for retrieval on composite keys. Acta informatica 4 (1974) 1\u20139.","DOI":"10.1007\/BF00288933"},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780195179484.001.0001"},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"crossref","unstructured":"Curtis Florence Jonathan Shepherd Iain Brennan and Thomas Simon. 2011. Effectiveness of anonymised information sharing and use in health service police and local government partnership for preventing violence related injury: experimental study and time series analysis. Bmj 342 (2011) d3313.","DOI":"10.1136\/bmj.d3313"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1142\/9789812831699_0007"},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"crossref","unstructured":"Daniel Franzen Claudia M\u00fcller-Birn and Odette Wegwarth. 2024. Communicating the Privacy-Utility Trade-off: Supporting Informed Data Donation with Privacy Decision Interfaces for Differential Privacy. Proceedings of the ACM on Human-Computer Interaction 8 CSCW1 (2024) 1\u201356.","DOI":"10.1145\/3637309"},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174241"},{"key":"e_1_3_3_2_25_2","doi-asserted-by":"crossref","unstructured":"Diana Freed Jackeline Palmer Diana\u00a0Elizabeth Minchala Karen Levy Thomas Ristenpart and Nicola Dell. 2017. Digital technologies and intimate partner violence: A qualitative analysis with multiple stakeholders. Proceedings of the ACM on human-computer interaction 1 CSCW (2017) 1\u201322.","DOI":"10.1145\/3134681"},{"key":"e_1_3_3_2_26_2","doi-asserted-by":"crossref","unstructured":"Jason\u00a0E Goldstick Rebecca\u00a0M Cunningham and Patrick\u00a0M Carter. 2022. Current causes of death in children and adolescents in the United States. New England journal of medicine 386 20 (2022) 1955\u20131956.","DOI":"10.1056\/NEJMc2201761"},{"key":"e_1_3_3_2_27_2","doi-asserted-by":"crossref","unstructured":"David\u00a0C Grossman and Bechara Choucair. 2019. Violence and the US health care sector: burden and response. Health Affairs 38 10 (2019) 1638\u20131645.","DOI":"10.1377\/hlthaff.2019.00642"},{"key":"e_1_3_3_2_28_2","unstructured":"Hagen Lisa. 2019. A Decades-Old Approach To Prevent Gunshot Wounds Is Catching On In Hospitals Around The U.S. https:\/\/www.wabe.org\/a-decades-old-approach-to-prevent-gunshot-wounds-is-catching-on-in-hospitals-around-the-u-s\/. Online."},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"crossref","unstructured":"Abigail Hankin Leon Haley Amy Baugher Kia Colbert and Debra Houry. 2015. Kiosk versus in-person screening for alcohol and drug use in the emergency department: patient preferences and disclosure. Western journal of emergency medicine 16 2 (2015) 220.","DOI":"10.5811\/westjem.2015.1.24121"},{"key":"e_1_3_3_2_30_2","doi-asserted-by":"crossref","unstructured":"Jennifer Hernandez-Meier Zengwang Xu Sara\u00a0A Kohlbeck Michael Levas Jonathan Shepherd and Stephen Hargarten. 2023. Linking emergency care and police department data to strengthen timely information on violence-related paediatric injuries. Emergency medicine journal 40 9 (2023) 653\u2013659.","DOI":"10.1136\/emermed-2023-213370"},{"key":"e_1_3_3_2_31_2","unstructured":"Michael\u00a0J Hindelang Michael Gottfredson et\u00a0al. 1976. The victim\u2019s decision not to invoke the criminal justice process. Criminal justice and the victim (1976) 57\u201378."},{"key":"e_1_3_3_2_32_2","doi-asserted-by":"crossref","unstructured":"JJ Huck JD Whyatt and Paul Coulton. 2014. Spraycan: A PPGIS for capturing imprecise notions of place. Applied Geography 55 (2014) 229\u2013237.","DOI":"10.1016\/j.apgeog.2014.09.007"},{"key":"e_1_3_3_2_33_2","doi-asserted-by":"crossref","unstructured":"Leonard Kaufman. 1990. Partitioning around medoids (program pam). Finding groups in data 344 (1990) 68\u2013125.","DOI":"10.1002\/9780470316801.ch2"},{"key":"e_1_3_3_2_34_2","doi-asserted-by":"crossref","unstructured":"Tammy\u00a0Rinehart Kochel. 2019. Explaining racial differences in Ferguson\u2019s impact on local residents\u2019 trust and perceived legitimacy: Policy implications for police. Criminal justice policy review 30 3 (2019) 374\u2013405.","DOI":"10.1177\/0887403416684923"},{"key":"e_1_3_3_2_35_2","doi-asserted-by":"crossref","unstructured":"Laura M\u00a0Mercer Kollar Steven\u00a0A Sumner Brad Bartholow Daniel\u00a0T Wu Jasmine\u00a0C Moore Elizabeth\u00a0W Mays Elizabeth\u00a0V Atkins David\u00a0A Fraser Charles\u00a0E Flood and Jonathan\u00a0P Shepherd. 2020. Building capacity for injury prevention: a process evaluation of a replication of the Cardiff Violence Prevention Programme in the Southeastern USA. Injury prevention 26 3 (2020) 221\u2013228.","DOI":"10.1136\/injuryprev-2018-043127"},{"key":"e_1_3_3_2_36_2","doi-asserted-by":"crossref","unstructured":"John Krumm. 2009. A survey of computational location privacy. Personal and Ubiquitous Computing 13 6 (2009) 391\u2013399.","DOI":"10.1007\/s00779-008-0212-5"},{"key":"e_1_3_3_2_37_2","volume-title":"Victimizations not reported to the police, 2006-2010","author":"Langton Lynn","year":"2012","unstructured":"Lynn Langton, Marcus Berzofsky, Christopher\u00a0P Krebs, and Hope Smiley-McDonald. 2012. Victimizations not reported to the police, 2006-2010. US Department of Justice, Office of Justice Programs, Bureau of Justice."},{"key":"e_1_3_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.5555\/646765.704129"},{"key":"e_1_3_3_2_39_2","doi-asserted-by":"crossref","unstructured":"Stuart Lloyd. 1982. Least squares quantization in PCM. IEEE transactions on information theory 28 2 (1982) 129\u2013137.","DOI":"10.1109\/TIT.1982.1056489"},{"key":"e_1_3_3_2_40_2","doi-asserted-by":"crossref","unstructured":"Ziggy MacDonald. 2001. Revisiting the dark figure: A microeconometric analysis of the under-reporting of property crime and its implications. British Journal of Criminology 41 1 (2001) 127\u2013149.","DOI":"10.1093\/bjc\/41.1.127"},{"key":"e_1_3_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497436"},{"key":"e_1_3_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642521"},{"key":"e_1_3_3_2_43_2","first-page":"3823","volume-title":"Proceedings of the workshop on the intersections between geospatial information and information technology","volume":"10","author":"Pang Alex","year":"2001","unstructured":"Alex Pang et\u00a0al. 2001. Visualizing uncertainty in geo-spatial data. In Proceedings of the workshop on the intersections between geospatial information and information technology , Vol.\u00a010. National Research Council Arlington, VA, 3823."},{"key":"e_1_3_3_2_44_2","doi-asserted-by":"crossref","unstructured":"Michael\u00a0D Reisig and Camille Lloyd. 2009. Procedural justice police legitimacy and helping the police fight crime: Results from a survey of Jamaican adolescents. Police quarterly 12 1 (2009) 42\u201362.","DOI":"10.1177\/1098611108327311"},{"key":"e_1_3_3_2_45_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642005"},{"key":"e_1_3_3_2_46_2","doi-asserted-by":"crossref","unstructured":"Hanan Samet. 1984. The quadtree and related hierarchical data structures. ACM Computing Surveys (CSUR) 16 2 (1984) 187\u2013260.","DOI":"10.1145\/356924.356930"},{"key":"e_1_3_3_2_47_2","doi-asserted-by":"publisher","DOI":"10.1145\/1866029.1866039"},{"key":"e_1_3_3_2_48_2","doi-asserted-by":"crossref","unstructured":"Kang\u00a0G Shin Xiaoen Ju Zhigang Chen and Xin Hu. 2012. Privacy protection for users of location-based services. IEEE Wireless Communications 19 1 (2012) 30\u201339.","DOI":"10.1109\/MWC.2012.6155874"},{"key":"e_1_3_3_2_49_2","doi-asserted-by":"crossref","unstructured":"Wesley\u00a0G Skogan. 1984. Reporting crimes to the police: The status of world research. Journal of research in crime and delinquency 21 2 (1984) 113\u2013137.","DOI":"10.1177\/0022427884021002003"},{"key":"e_1_3_3_2_50_2","doi-asserted-by":"crossref","unstructured":"Justice Tankebe. 2013. Viewing things differently: The dimensions of public perceptions of police legitimacy. Criminology 51 1 (2013) 103\u2013135.","DOI":"10.1111\/j.1745-9125.2012.00291.x"},{"key":"e_1_3_3_2_51_2","doi-asserted-by":"crossref","unstructured":"Manolis Terrovitis. 2011. Privacy preservation in the dissemination of location data. ACM SIGKDD Explorations Newsletter 13 1 (2011) 6\u201318.","DOI":"10.1145\/2031331.2031334"},{"key":"e_1_3_3_2_52_2","unstructured":"Alexandra Thompson and Susannah\u00a0N Tapp. 2022. Criminal victimization 2021. NCJ 305101 (2022)."},{"key":"e_1_3_3_2_53_2","doi-asserted-by":"publisher","DOI":"10.1117\/12.587254"},{"key":"e_1_3_3_2_54_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3502038"},{"key":"e_1_3_3_2_55_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300492"},{"key":"e_1_3_3_2_56_2","doi-asserted-by":"crossref","unstructured":"Daniel\u00a0T Wu Jasmine\u00a0C Moore Daniel\u00a0A Bowen Laura M\u00a0Mercer Kollar Elizabeth\u00a0W Mays Thomas\u00a0R Simon and Steven\u00a0A Sumner. 2019. Proportion of violent injuries unreported to law enforcement. JAMA internal medicine 179 1 (2019) 111\u2013112.","DOI":"10.1001\/jamainternmed.2018.5139"},{"key":"e_1_3_3_2_57_2","doi-asserted-by":"crossref","unstructured":"Min Xie and Eric\u00a0P Baumer. 2019. Crime victims\u2019 decisions to call the police: Past research and new directions. Annual Review of Criminology 2 1 (2019) 217\u2013240.","DOI":"10.1146\/annurev-criminol-011518-024748"},{"key":"e_1_3_3_2_58_2","doi-asserted-by":"crossref","unstructured":"Yan Yan Xin Gao Adnan Mahmood Tao Feng and Pengshou Xie. 2020. Differential private spatial decomposition and location publishing based on unbalanced quadtree partition algorithm. IEEE Access 8 (2020) 104775\u2013104787.","DOI":"10.1109\/ACCESS.2020.2999580"},{"key":"e_1_3_3_2_59_2","doi-asserted-by":"publisher","DOI":"10.1117\/12.643631"}],"event":{"name":"CHI 2025: CHI Conference on Human Factors in Computing Systems","location":"Yokohama Japan","acronym":"CHI '25","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2025 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706598.3714136","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3706598.3714136","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T06:06:05Z","timestamp":1751609165000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706598.3714136"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,25]]},"references-count":58,"alternative-id":["10.1145\/3706598.3714136","10.1145\/3706598"],"URL":"https:\/\/doi.org\/10.1145\/3706598.3714136","relation":{},"subject":[],"published":{"date-parts":[[2025,4,25]]},"assertion":[{"value":"2025-04-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}