{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T22:36:57Z","timestamp":1776119817782,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T00:00:00Z","timestamp":1745539200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,4,26]]},"DOI":"10.1145\/3706599.3720099","type":"proceedings-article","created":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T20:07:11Z","timestamp":1745438831000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Privacy Meets Explainability: Managing Confidential Data and Transparency Policies in LLM-Empowered Science"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6414-9416","authenticated-orcid":false,"given":"Yashothara","family":"Shanmugarasa","sequence":"first","affiliation":[{"name":"Data61, CSIRO, Eviliegh, NSW, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2162-0407","authenticated-orcid":false,"given":"Shidong","family":"Pan","sequence":"additional","affiliation":[{"name":"Data61, CSIRO, Sydney, NSW, Australia and School of Computing, Australian National University, Canberra, ACT, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3690-0321","authenticated-orcid":false,"given":"Ming","family":"Ding","sequence":"additional","affiliation":[{"name":"Data61, CSIRO, Sydney, New South Wales, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3637-4939","authenticated-orcid":false,"given":"Dehai","family":"Zhao","sequence":"additional","affiliation":[{"name":"CSIRO's Data61, Sydney, New South Wales, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7698-6214","authenticated-orcid":false,"given":"Thierry","family":"Rakotoarivelo","sequence":"additional","affiliation":[{"name":"Privacy Technology Research Group, CSIRO, Sydney, Australia"}]}],"member":"320","published-online":{"date-parts":[[2025,4,25]]},"reference":[{"key":"e_1_3_3_1_2_2","unstructured":"[n. d.]. EntityRecognizer \u00b7 spaCy API Documentation \u2014 spacy.io. https:\/\/spacy.io\/api\/entityrecognizer. [Accessed 23-01-2025]."},{"key":"e_1_3_3_1_3_2","unstructured":"Nobel Prize\u00a0Outreach 2025. 2024. The Nobel Prize in Physics and Biology 2024. https:\/\/www.nobelprize.org\/prizes\/physics\/2024\/summary\/."},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"crossref","unstructured":"Rocio Aldeco\u00a0Perez and Luc Moreau. 2008. Provenance-based auditing of private data use. Visions of Computer Science - BCS International Academic Conference (VOCS) (2008).","DOI":"10.14236\/ewic\/VOCS2008.13"},{"key":"e_1_3_3_1_5_2","first-page":"585","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Andow Benjamin","year":"2019","unstructured":"Benjamin Andow, Samin\u00a0Yaseer Mahmud, Wenyu Wang, Justin Whitaker, William Enck, Bradley Reaves, Kapil Singh, and Tao Xie. 2019. PolicyLint: Investigating Internal Privacy Policy Contradictions on Google Play. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, 585\u2013602. https:\/\/www.usenix.org\/conference\/usenixsecurity19\/presentation\/andow"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/2702613.2732701"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613905.3636301"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"crossref","unstructured":"Kristian\u00a0Gonzalez Barman Nathan Wood and Pawel Pawlowski. 2024. Beyond transparency and explainability: on the need for adequate and contextualized user guidelines for LLM use. Ethics and Information Technology 26 3 (2024) 47.","DOI":"10.1007\/s10676-024-09778-2"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-44760-5_9"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"crossref","unstructured":"Jean-Simon Brouard Flavio Schenkel Andrew Marete and Nathalie Bissonnette. 2019. The GATK joint genotyping workflow is appropriate for calling variants in RNA-seq experiments. Journal of animal science and biotechnology 10 (2019) 1\u20136.","DOI":"10.1186\/s40104-019-0359-0"},{"key":"e_1_3_3_1_11_2","unstructured":"Tom Brown Benjamin Mann Nick Ryder Melanie Subbiah Jared\u00a0D Kaplan Prafulla Dhariwal Arvind Neelakantan Pranav Shyam Girish Sastry Amanda Askell et\u00a0al. 2020. Language models are few-shot learners. Advances in neural information processing systems 33 (2020) 1877\u20131901."},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"crossref","unstructured":"Duc Bui Kang\u00a0G Shin Jong-Min Choi and Junbum Shin. 2021. Automated extraction and presentation of data practices in privacy policies. Proceedings on Privacy Enhancing Technologies (2021).","DOI":"10.2478\/popets-2021-0019"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484536"},{"key":"e_1_3_3_1_14_2","unstructured":"Yu Chen Tingxin Li Huiming Liu and Yang Yu. 2023. Hide and Seek (HaS): A Lightweight Framework for Prompt Privacy Protection. arxiv:https:\/\/arXiv.org\/abs\/2309.03057\u00a0[cs.CR]"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"crossref","unstructured":"UniProt Consortium. 2015. UniProt: a hub for protein information. Nucleic acids research 43 D1 (2015) D204\u2013D212.","DOI":"10.1093\/nar\/gku989"},{"key":"e_1_3_3_1_16_2","unstructured":"CrewAI. [n. d.]. Tools - CrewAI \u2014 docs.crewai.com. https:\/\/docs.crewai.com\/concepts\/tools. [Accessed 23-01-2025]."},{"key":"e_1_3_3_1_17_2","first-page":"1037","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Cui Hao","year":"2023","unstructured":"Hao Cui, Rahmadi Trimananda, Athina Markopoulou, and Scott Jordan. 2023. { PoliGraph} : Automated privacy policy analysis using knowledge graphs. In 32nd USENIX Security Symposium (USENIX Security 23). 1037\u20131054."},{"key":"e_1_3_3_1_18_2","unstructured":"Travis Dyde. 2023. Documentation on the emergence current iterations and possible future of Artificial Intelligence with a focus on Large Language Models. (2023)."},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613905.3636311"},{"key":"e_1_3_3_1_20_2","unstructured":"Google. [n. d.]. Sign in - Google Accounts \u2014 google.com. https:\/\/www.google.com\/dashboard\/. [Accessed 23-01-2025]."},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/3442188.3445925"},{"key":"e_1_3_3_1_22_2","unstructured":"David Haber. 2024. Introducing Lakera Guard \u2013 Bringing Enterprise-Grade Security to LLMs with One Line of Code | Lakera \u2013 Protecting AI teams that disrupt the world. \u2014 lakera.ai. https:\/\/www.lakera.ai\/blog\/lakera-guard-overview. [Accessed 15-05-2024]."},{"key":"e_1_3_3_1_23_2","first-page":"531","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Harkous Hamza","year":"2018","unstructured":"Hamza Harkous, Kassem Fawaz, R\u00e9mi Lebret, Florian Schaub, Kang\u00a0G Shin, and Karl Aberer. 2018. Polisis: Automated analysis and presentation of privacy policies using deep learning. In 27th USENIX Security Symposium (USENIX Security 18). 531\u2013548."},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"crossref","unstructured":"Florian Hartmann Duc-Hieu Tran Peter Kairouz Victor C\u0103rbune and Blaise\u00a0Aguera y Arcas. 2024. Can LLMs get help from other LLMs without revealing private information? arxiv:https:\/\/arXiv.org\/abs\/2404.01041\u00a0[cs.LG] https:\/\/arxiv.org\/abs\/2404.01041","DOI":"10.18653\/v1\/2024.privatenlp-1.12"},{"key":"e_1_3_3_1_25_2","doi-asserted-by":"crossref","unstructured":"Roger\u00a0C Jensen Royce\u00a0L Bird and Blake\u00a0W Nichols. 2022. Risk assessment matrices for workplace hazards: Design for usability. International journal of environmental research and public health 19 5 (2022) 2763.","DOI":"10.3390\/ijerph19052763"},{"key":"e_1_3_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICACC63692.2024.10845690"},{"key":"e_1_3_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29615-4_10"},{"key":"e_1_3_3_1_28_2","unstructured":"Shivani Kapania Ruiyi Wang Toby Jia-Jun Li Tianshi Li and Hong Shen. 2024. \" I\u2019m categorizing LLM as a productivity tool\": Examining ethics of LLM use in HCI research practices. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2403.19876 (2024)."},{"key":"e_1_3_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572538"},{"key":"e_1_3_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2010.51"},{"key":"e_1_3_3_1_31_2","doi-asserted-by":"crossref","unstructured":"Jacob\u00a0Leon Kr\u00f6ger Leon Gellrich Sebastian Pape Saba\u00a0Rebecca Brause and Stefan Ullrich. 2022. Personal information inference from voice recordings: User awareness and privacy concerns. Proc. Priv. Enhancing Technol. 2022 1 (2022) 6\u201327.","DOI":"10.2478\/popets-2022-0002"},{"key":"e_1_3_3_1_32_2","unstructured":"LangChain. 2024. Tools |LangChain \u2014 python.langchain.com. https:\/\/python.langchain.com\/v0.1\/docs\/modules\/tools\/. [Accessed 23-01-2025]."},{"key":"e_1_3_3_1_33_2","unstructured":"Tianshi Li Sauvik Das Hao-Ping Lee Dakuo Wang Bingsheng Yao and Zhiping Zhang. 2024. Human-Centered Privacy Research in the Age of Large Language Models. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2402.01994 (2024)."},{"key":"e_1_3_3_1_34_2","unstructured":"Q\u00a0Vera Liao and Jennifer\u00a0Wortman Vaughan. 2023. Ai transparency in the age of llms: A human-centered research roadmap. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2306.01941 10 (2023)."},{"key":"e_1_3_3_1_35_2","unstructured":"Guo Lin Wenyue Hua and Yongfeng Zhang. 2024. EmojiCrypt: Prompt Encryption for Secure Communication with Large Language Models. arxiv:https:\/\/arXiv.org\/abs\/2402.05868\u00a0[cs.CL] https:\/\/arxiv.org\/abs\/2402.05868"},{"key":"e_1_3_3_1_36_2","unstructured":"Aatish Mandelecha. 2024. How to Secure Sensitive Data in LLM Prompts? \u2014 strac.io. https:\/\/www.strac.io\/blog\/secure-sensitive-data-in-llm-prompts. [Accessed 14-05-2024]."},{"key":"e_1_3_3_1_37_2","unstructured":"Aleecia\u00a0M McDonald and Lorrie\u00a0Faith Cranor. 2008. The cost of reading privacy policies. Isjlp 4 (2008) 543."},{"key":"e_1_3_3_1_38_2","unstructured":"Microsoft. 2024. Home - Microsoft Presidio \u2014 microsoft.github.io. https:\/\/microsoft.github.io\/presidio\/. [Accessed 21-01-2025]."},{"key":"e_1_3_3_1_39_2","unstructured":"National Science\u00a0Foundation (NSF). [n. d.]. Notice to research community: Use of generative artificial intelligence technology in the NSF merit review process. https:\/\/new.nsf.gov\/news\/notice-to-the-research-community-on-ai. [Accessed 21-01-2025]."},{"key":"e_1_3_3_1_40_2","unstructured":"Institute of Standards and Technology (NIST). 2024. National Institute of Standards and Technology \u2014 nist.gov. https:\/\/www.nist.gov\/. [Accessed 21-01-2025]."},{"key":"e_1_3_3_1_41_2","unstructured":"Shidong Pan Thong Hoang Dawen Zhang Zhenchang Xing Xiwei Xu Qinghua Lu and Mark Staples. 2023. Toward the cure of privacy policy reading phobia: Automated generation of privacy nutrition labels from privacy policies. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2306.10923 (2023)."},{"key":"e_1_3_3_1_42_2","unstructured":"PRIME. 2004. PRIME - Privacy and Identity Management for Europe \u2014 Portal for the PRIME Project \u2014 prime-project.eu. https:\/\/prime-project.eu\/. [Accessed 23-01-2025]."},{"key":"e_1_3_3_1_43_2","doi-asserted-by":"publisher","DOI":"10.1145\/2517840.2517847"},{"key":"e_1_3_3_1_44_2","unstructured":"Philip Raschke Axel K\u00fcpper Olha Drozd and Sabrina Kirrane. 2018. Designing a GDPR-compliant and usable privacy dashboard. Privacy and Identity Management. The Smart Revolution: 12th IFIP WG 9.2 9.5 9.6\/11.7 11.6\/SIG 9.2. 2 International Summer School Ispra Italy September 4-8 2017 Revised Selected Papers 12 (2018) 221\u2013236."},{"key":"e_1_3_3_1_45_2","unstructured":"Siladitya Ray. 2023. Samsung Bans ChatGPT Among Employees After Sensitive Code Leak \u2014 forbes.com. https:\/\/www.forbes.com\/sites\/siladityaray\/2023\/05\/02\/samsung-bans-chatgpt-and-other-chatbots-for-employees-after-sensitive-code-leak\/. [Accessed 24-01-2025]."},{"key":"e_1_3_3_1_46_2","unstructured":"Walid\u00a0S Saba. 2023. Towards explainable and language-agnostic LLMs: symbolic reverse engineering of language at scale. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2306.00017 (2023)."},{"key":"e_1_3_3_1_47_2","doi-asserted-by":"crossref","unstructured":"Mario S\u00e4nger Samuele Garda Xing\u00a0David Wang Leon Weber-Genzel Pia Droop Benedikt Fuchs Alan Akbik and Ulf Leser. 2024. HunFlair2 in a cross-corpus evaluation of biomedical named entity recognition and normalization tools. Bioinformatics 40 10 (2024) btae564.","DOI":"10.1093\/bioinformatics\/btae564"},{"key":"e_1_3_3_1_48_2","doi-asserted-by":"crossref","unstructured":"Marija Schufrin Steven\u00a0Lamarr Reynolds Arjan Kuijper and Jorn Kohlhammer. 2020. A visualization interface to improve the transparency of collected personal data on the internet. IEEE Transactions on Visualization and Computer Graphics 27 2 (2020) 1840\u20131849.","DOI":"10.1109\/TVCG.2020.3028946"},{"key":"e_1_3_3_1_49_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICECET61485.2024.10698306"},{"key":"e_1_3_3_1_50_2","doi-asserted-by":"crossref","unstructured":"Larry Smith Lorraine\u00a0K Tanabe Rie Johnson\u00a0nee Ando Cheng-Ju Kuo I-Fang Chung Chun-Nan Hsu Yu-Shi Lin Roman Klinger Christoph\u00a0M Friedrich Kuzman Ganchev et\u00a0al. 2008. Overview of BioCreative II gene mention recognition. Genome biology 9 (2008) 1\u201319.","DOI":"10.1186\/gb-2008-9-s2-s2"},{"key":"e_1_3_3_1_51_2","doi-asserted-by":"crossref","unstructured":"Mujeen Sung Minbyul Jeong Yonghwa Choi Donghyeon Kim Jinhyuk Lee and Jaewoo Kang. 2022. BERN2: an advanced neural biomedical named entity recognition and normalization tool. Bioinformatics 38 20 (2022) 4837\u20134839.","DOI":"10.1093\/bioinformatics\/btac598"},{"key":"e_1_3_3_1_52_2","unstructured":"Chenhao Tang Zhengliang Liu Chong Ma Zihao Wu Yiwei Li Wei Liu Dajiang Zhu Quanzheng Li Xiang Li Tianming Liu and Lei Fan. 2023. PolicyGPT: Automated Analysis of Privacy Policies with Large Language Models. arxiv:https:\/\/arXiv.org\/abs\/2309.10238\u00a0[cs.CL] https:\/\/arxiv.org\/abs\/2309.10238"},{"key":"e_1_3_3_1_53_2","first-page":"3789","volume-title":"31st USENIX security symposium (USENIX security 22)","author":"Trimananda Rahmadi","year":"2022","unstructured":"Rahmadi Trimananda, Hieu Le, Hao Cui, Janice\u00a0Tran Ho, Anastasia Shuba, and Athina Markopoulou. 2022. { OVRseen} : Auditing network traffic and privacy policies in oculus { VR}. In 31st USENIX security symposium (USENIX security 22). 3789\u20133806."},{"key":"e_1_3_3_1_54_2","doi-asserted-by":"crossref","unstructured":"Leon Weber Mario S\u00e4nger Jannes M\u00fcnchmeyer Maryam Habibi Ulf Leser and Alan Akbik. 2021. HunFlair: an easy-to-use tool for state-of-the-art biomedical named entity recognition. Bioinformatics 37 17 (2021) 2792\u20132794.","DOI":"10.1093\/bioinformatics\/btab042"},{"key":"e_1_3_3_1_55_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P16-1126"},{"key":"e_1_3_3_1_56_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642385"},{"key":"e_1_3_3_1_57_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2023.findings-acl.337"},{"key":"e_1_3_3_1_58_2","first-page":"1","volume-title":"23rd USENIX Security Symposium (USENIX Security 14)","author":"Zimmeck Sebastian","year":"2014","unstructured":"Sebastian Zimmeck and Steven\u00a0M Bellovin. 2014. Privee: An architecture for automatically analyzing web privacy policies. In 23rd USENIX Security Symposium (USENIX Security 14). 1\u201316."}],"event":{"name":"CHI EA '25: Extended Abstracts of the CHI Conference on Human Factors in Computing Systems","location":"Yokohama Japan","acronym":"CHI EA '25","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the Extended Abstracts of the CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706599.3720099","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3706599.3720099","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:48Z","timestamp":1750295928000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706599.3720099"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,25]]},"references-count":57,"alternative-id":["10.1145\/3706599.3720099","10.1145\/3706599"],"URL":"https:\/\/doi.org\/10.1145\/3706599.3720099","relation":{},"subject":[],"published":{"date-parts":[[2025,4,25]]},"assertion":[{"value":"2025-04-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}