{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T07:56:32Z","timestamp":1776930992143,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":136,"publisher":"ACM","license":[{"start":{"date-parts":[[2027,4,13]],"date-time":"2027-04-13T00:00:00Z","timestamp":1807574400000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CNS-2426396"],"award-info":[{"award-number":["CNS-2426396"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2026,4,13]]},"DOI":"10.1145\/3772318.3790671","type":"proceedings-article","created":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T04:12:33Z","timestamp":1776053553000},"page":"1-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["From Fragmentation to Integration: Exploring the Design Space of AI Agents for Human-as-the-Unit Privacy Management"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-0255-0614","authenticated-orcid":false,"given":"Eryue","family":"Xu","sequence":"first","affiliation":[{"name":"School of Information Sciences, University of Illinois Urbana-Champaign, Urbana, Illinois, USA and Khoury College of Computer Sciences, Northeastern University, Boston, Massachusetts, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0877-5727","authenticated-orcid":false,"given":"Tianshi","family":"Li","sequence":"additional","affiliation":[{"name":"Khoury College of Computer Sciences, Northeastern University, Boston, Massachusetts, USA"}]}],"member":"320","published-online":{"date-parts":[[2026,4,13]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"crossref","unstructured":"Elizabeth Aguirre Anne\u00a0L Roggeveen Dhruv Grewal and Martin Wetzels. 2016. The personalization-privacy paradox: implications for new media. Journal of consumer marketing 33 2 (2016) 98\u2013110.","DOI":"10.1108\/JCM-06-2015-1458"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","unstructured":"Eman Alashwali Andrea Miller Alexandra Nisenoff Kyerra Norton Ellie Young Prerna Bothra Mandy Lanyon and Lorrie\u00a0Faith Cranor. 2025. Interface Design to Support Informed Choices When Users Face Numerous Privacy Decisions. IEEE Transactions on Privacy 2 (2025) 79\u201391. 10.1109\/TP.2025.3592580","DOI":"10.1109\/TP.2025.3592580"},{"key":"e_1_3_3_1_4_2","unstructured":"Apple Inc.2020. App privacy details on the App Store. https:\/\/developer.apple.com\/app-store\/app-privacy-details\/ Apple Developer Documentation."},{"key":"e_1_3_3_1_5_2","unstructured":"Apple Inc.2025. App Store Categories. Apple Developer. https:\/\/developer.apple.com\/app-store\/categories\/ Accessed: 2025-12-04."},{"key":"e_1_3_3_1_6_2","volume-title":"Privacy Nutrition Labels","author":"Inc. Apple","unstructured":"Apple Inc.n. d.. Privacy Nutrition Labels. https:\/\/www.apple.com\/privacy\/labels\/ Accessed: 2025-09-01."},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","unstructured":"Noah Apthorpe Yan Shvartzshnaider Arunesh Mathur Dillon Reisman and Nick Feamster. 2018. Discovering smart home internet of things privacy norms using contextual integrity. Proceedings of the ACM on interactive mobile wearable and ubiquitous technologies 2 2 (2018) 1\u201323. 10.1145\/3214262","DOI":"10.1145\/3214262"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3690350"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","unstructured":"Florian Bemmann Helena Stoll and Sven Mayer. 2024. Privacy Slider: Fine-Grain Privacy Control for Smartphones. Proc. ACM Hum.-Comput. Interact. 8 MHCI Article 272 (Sept. 2024) 31\u00a0pages. 10.1145\/3676519","DOI":"10.1145\/3676519"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"crossref","unstructured":"Peter\u00a0M Bentler and Chih-Ping Chou. 1987. Practical issues in structural modeling. Sociological methods & research 16 1 (1987) 78\u2013117.","DOI":"10.1177\/0049124187016001004"},{"key":"e_1_3_3_1_11_2","unstructured":"Alex Bie and Umar Syed. 2025. Generating synthetic data with differentially private LLM inference. Google Research Blog. https:\/\/research.google\/blog\/generating-synthetic-data-with-differentially-private-llm-inference\/."},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"crossref","unstructured":"Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative research in psychology. Qualitative research in Psychology 3 2 (2006) 77\u2013101.","DOI":"10.1191\/1478088706qp063oa"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/IEEM62345.2024.10856991"},{"key":"e_1_3_3_1_14_2","volume-title":"The Eleventh International Conference on Learning Representations","author":"Carlini Nicholas","year":"2022","unstructured":"Nicholas Carlini, Daphne Ippolito, Matthew Jagielski, Katherine Lee, Florian Tramer, and Chiyuan Zhang. 2022. Quantifying memorization across neural language models. In The Eleventh International Conference on Learning Representations."},{"key":"e_1_3_3_1_15_2","first-page":"2633","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Carlini Nicholas","year":"2021","unstructured":"Nicholas Carlini, Florian Tramer, Eric Wallace, Matthew Jagielski, Ariel Herbert-Voss, Katherine Lee, Adam Roberts, Tom Brown, Dawn Song, Ulfar Erlingsson, et\u00a0al. 2021. Extracting Training Data from Large Language Models. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 2633\u20132650. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/carlini-extracting"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/3708359.3712156"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"crossref","unstructured":"Zhaorun Chen Zhen Xiang Chaowei Xiao Dawn Song and Bo Li. 2024. Agentpoison: Red-teaming llm agents via poisoning memory or knowledge bases. Advances in Neural Information Processing Systems 37 (2024) 130185\u2013130213.","DOI":"10.52202\/079017-4136"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"crossref","unstructured":"Hichang Cho. 2022. Privacy helplessness on social media: Its constituents antecedents and consequences. Internet Research 32 1 (2022) 150\u2013171.","DOI":"10.1108\/INTR-05-2020-0269"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"crossref","unstructured":"Hanbyul Choi Jonghwa Park and Yoonhyuk Jung. 2018. The role of privacy fatigue in online privacy behavior. Computers in Human Behavior 81 (2018) 42\u201351.","DOI":"10.1016\/j.chb.2017.12.001"},{"key":"e_1_3_3_1_20_2","unstructured":"World Wide\u00a0Web Consortium et\u00a0al. 2002. The platform for privacy preferences 1.0 (P3P1. 0) specification. (2002)."},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"publisher","unstructured":"Giuseppe Contissa Koen Docter Francesca Lagioia Marco Lippi Hans-W Micklitz Przemys\u0142aw Pa\u0142ka Giovanni Sartor and Paolo Torroni. 2018. Claudette meets GDPR: Automating the evaluation of privacy policies using artificial intelligence. Available at SSRN 3208596. 10.2139\/ssrn.3208596","DOI":"10.2139\/ssrn.3208596"},{"key":"e_1_3_3_1_22_2","unstructured":"CrewAI. 2025. CrewAI: The Leading Multi-Agent Platform. https:\/\/www.crewai.com\/. Accessed: 2025-12-01."},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2023.238930"},{"key":"e_1_3_3_1_24_2","first-page":"1037","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Cui Hao","year":"2023","unstructured":"Hao Cui, Rahmadi Trimananda, Athina Markopoulou, and Scott Jordan. 2023. { PoliGraph} : Automated privacy policy analysis using knowledge graphs. In 32nd USENIX Security Symposium (USENIX Security 23). 1037\u20131054."},{"key":"e_1_3_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v7i1.14412"},{"key":"e_1_3_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74853-3_25"},{"key":"e_1_3_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23378"},{"key":"e_1_3_3_1_28_2","doi-asserted-by":"publisher","unstructured":"Kenan Degirmenci. 2020. Mobile users\u2019 information privacy concerns and the role of app permission requests. International Journal of Information Management 50 (2020) 261\u2013272. 10.1016\/j.ijinfomgt.2019.05.010","DOI":"10.1016\/j.ijinfomgt.2019.05.010"},{"key":"e_1_3_3_1_29_2","first-page":"2473","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Do Youngwook","year":"2023","unstructured":"Youngwook Do, Nivedita Arora, Ali Mirzazadeh, Injoo Moon, Eryue Xu, Zhihan Zhang, Gregory\u00a0D. Abowd, and Sauvik Das. 2023. Powering for Privacy: Improving User Trust in Smart Speaker Microphones with Intentional Powering and Perceptible Assurance. In 32nd USENIX Security Symposium (USENIX Security 23). USENIX Association, Anaheim, CA, 2473\u20132490. https:\/\/www.usenix.org\/conference\/usenixsecurity23\/presentation\/do"},{"key":"e_1_3_3_1_30_2","doi-asserted-by":"publisher","unstructured":"Nora\u00a0A Draper Christian Pieter\u00a0Hoffmann Christoph Lutz Giulia Ranzini and Joseph Turow. 2024. Privacy resignation apathy and cynicism: Introduction to a special theme. Big Data & Society 11 3 (2024). 10.1177\/20539517241270663","DOI":"10.1177\/20539517241270663"},{"key":"e_1_3_3_1_31_2","doi-asserted-by":"crossref","unstructured":"Nora\u00a0A Draper and Joseph Turow. 2019. The corporate cultivation of digital resignation. New media & society 21 8 (2019) 1824\u20131839.","DOI":"10.1177\/1461444819833331"},{"key":"e_1_3_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772727"},{"key":"e_1_3_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046779"},{"key":"e_1_3_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445148"},{"key":"e_1_3_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1145\/2973750.2973770"},{"key":"e_1_3_3_1_36_2","doi-asserted-by":"publisher","unstructured":"Dorota Filipczuk Tim Baarslag Enrico\u00a0H Gerding and MC Schraefel. 2022. Automated privacy negotiations with preference uncertainty. Autonomous Agents and Multi-Agent Systems 36 2 (2022) 49. 10.1007\/s10458-022-09579-1","DOI":"10.1007\/s10458-022-09579-1"},{"key":"e_1_3_3_1_37_2","unstructured":"Vincent Freiberger Arthur Fleig and Erik Buchmann. 2025. PRISMe: A Novel LLM-Powered Tool for Interactive Privacy Policy Assessment. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2501.16033 (2025)."},{"key":"e_1_3_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1145\/3706599.3719816"},{"key":"e_1_3_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2025.ijcnlp-long.134"},{"key":"e_1_3_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1145\/3715275.3732195"},{"key":"e_1_3_3_1_41_2","first-page":"321","volume-title":"Twelfth symposium on usable privacy and security (SOUPS 2016)","author":"Gluck Joshua","year":"2016","unstructured":"Joshua Gluck, Florian Schaub, Amy Friedman, Hana Habib, Norman Sadeh, Lorrie\u00a0Faith Cranor, and Yuvraj Agarwal. 2016. How short is too short? Implications of length and framing on the effectiveness of privacy notices. In Twelfth symposium on usable privacy and security (SOUPS 2016). 321\u2013340."},{"key":"e_1_3_3_1_42_2","unstructured":"Google. 2023. Permissions on Android. https:\/\/developer.android.com\/guide\/topics\/permissions\/overview Android Developer Documentation."},{"key":"e_1_3_3_1_43_2","unstructured":"Google LLC. 2025. Google Play Store: Apps for Android. Online. https:\/\/play.google.com\/store\/apps?device=phone&hl=en Accessed: 2025-12-04."},{"key":"e_1_3_3_1_44_2","unstructured":"Bingcan Guo Eryue Xu Zhiping Zhang and Tianshi Li. 2025. Not my agent not my boundary? elicitation of personal privacy boundaries in ai-delegated information sharing. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2509.21712 (2025)."},{"key":"e_1_3_3_1_45_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376511"},{"key":"e_1_3_3_1_46_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3501985"},{"key":"e_1_3_3_1_47_2","first-page":"387","volume-title":"Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019)","author":"Habib Hana","year":"2019","unstructured":"Hana Habib, Yixin Zou, Aditi Jannu, Neha Sridhar, Chelse Swoopes, Alessandro Acquisti, Lorrie\u00a0Faith Cranor, Norman Sadeh, and Florian Schaub. 2019. An empirical analysis of data deletion and { Opt-Out} choices on 150 websites. In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). 387\u2013406."},{"key":"e_1_3_3_1_48_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642104"},{"key":"e_1_3_3_1_49_2","unstructured":"Joseph\u00a0F Hair. 2009. Multivariate data analysis. (2009)."},{"key":"e_1_3_3_1_50_2","doi-asserted-by":"publisher","DOI":"10.1145\/3730567.3732922"},{"key":"e_1_3_3_1_51_2","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702561"},{"key":"e_1_3_3_1_52_2","volume-title":"Twelfth Symposium on Usable Privacy and Security (SOUPS 2016)","author":"Harkous Hamza","year":"2016","unstructured":"Hamza Harkous, Kassem Fawaz, Kang\u00a0G. Shin, and Karl Aberer. 2016. PriBots: Conversational Privacy with Chatbots. In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016). USENIX Association, Denver, CO. https:\/\/www.usenix.org\/conference\/soups2016\/workshop-program\/wfpn\/presentation\/harkous"},{"key":"e_1_3_3_1_53_2","doi-asserted-by":"publisher","unstructured":"Fred Heiding Bruce Schneier Arun Vishwanath Jeremy Bernstein and Peter\u00a0S. Park. 2024. Devising and Detecting Phishing Emails Using Large Language Models. IEEE Access 12 (2024) 42131\u201342146. 10.1109\/ACCESS.2024.3375882","DOI":"10.1109\/ACCESS.2024.3375882"},{"key":"e_1_3_3_1_54_2","doi-asserted-by":"publisher","unstructured":"Christian\u00a0Pieter Hoffmann Christoph Lutz and Giulia Ranzini. 2016. Privacy Cynicism: A New Approach to the Privacy Paradox. Cyberpsychology: Journal of Psychosocial Research on Cyberspace 10 4 (2016) Article 7. 10.5817\/CP2016-4-7","DOI":"10.5817\/CP2016-4-7"},{"key":"e_1_3_3_1_55_2","doi-asserted-by":"crossref","unstructured":"P. Iafrate et\u00a0al. 2016. Consent2Share: An Integrated Broad Consenting Process and Electronic System to Support Research and Clinical Care. Journal of Clinical and Translational Science \/ Translational Research Reports (2016). https:\/\/www.ncbi.nlm.nih.gov\/pmc\/articles\/PMC6410634\/","DOI":"10.18053\/jctres.02.201604.001"},{"key":"e_1_3_3_1_56_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580773"},{"key":"e_1_3_3_1_57_2","unstructured":"Hakan Inan Kartikeya Upasani Jianfeng Chi Rashi Rungta Krithika Iyer Yuning Mao Michael Tontchev Qing Hu Brian Fuller Davide Testuggine et\u00a0al. 2023. Llama guard: Llm-based input-output safeguard for human-ai conversations. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2312.06674 (2023)."},{"key":"e_1_3_3_1_58_2","unstructured":"Changyue Jiang Xudong Pan Geng Hong Chenfu Bao and Min Yang. 2024. Rag-thief: Scalable extraction of private data from retrieval-augmented generation applications with agent-based attacks. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2411.14110 (2024)."},{"key":"e_1_3_3_1_59_2","doi-asserted-by":"publisher","unstructured":"Jinglu Jiang Alexander\u00a0J Karran Constantinos\u00a0K Coursaris Pierre-Majorique L\u00e9ger and Joerg Beringer. 2023. A situation awareness perspective on human-AI interaction: Tensions and opportunities. International Journal of Human\u2013Computer Interaction 39 9 (2023) 1789\u20131806. 10.1080\/10447318.2022.2093863","DOI":"10.1080\/10447318.2022.2093863"},{"key":"e_1_3_3_1_60_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517602"},{"key":"e_1_3_3_1_61_2","first-page":"39","volume-title":"Eleventh symposium on usable privacy and security (SOUPS 2015)","author":"Kang Ruogu","year":"2015","unstructured":"Ruogu Kang, Laura Dabbish, Nathaniel Fruchter, and Sara Kiesler. 2015. { \u201cMy} data just goes { Everywhere:\u201d} user mental models of the internet and implications for privacy and security. In Eleventh symposium on usable privacy and security (SOUPS 2015). 39\u201352."},{"key":"e_1_3_3_1_62_2","first-page":"14","volume-title":"International Conference on Information Systems (ICIS 2014), Auckland, New Zealand, December","author":"Keith Mark\u00a0J","year":"2014","unstructured":"Mark\u00a0J Keith, Courtenay Maynes, Paul\u00a0Benjamin Lowry, and Jeffry Babb. 2014. Privacy fatigue: The effect of privacy control complexity on consumer electronic information disclosure. In International Conference on Information Systems (ICIS 2014), Auckland, New Zealand, December. 14\u201317."},{"key":"e_1_3_3_1_63_2","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572538"},{"key":"e_1_3_3_1_64_2","first-page":"1729","volume-title":"34th USENIX Security Symposium (USENIX Security 25)","author":"Kim Hanna","year":"2025","unstructured":"Hanna Kim, Minkyoo Song, Seung\u00a0Ho Na, Seungwon Shin, and Kimin Lee. 2025. When { LLMs} Go Online: The Emerging Threat of { Web-Enabled}{ LLMs}. In 34th USENIX Security Symposium (USENIX Security 25). 1729\u20131748."},{"key":"e_1_3_3_1_65_2","doi-asserted-by":"publisher","unstructured":"Josephine Lau Benjamin Zimmerman and Florian Schaub. 2018. Alexa are you listening? Privacy perceptions concerns and privacy-seeking behaviors with smart speakers. Proceedings of the ACM on human-computer interaction 2 CSCW (2018) 1\u201331. 10.1145\/3274371","DOI":"10.1145\/3274371"},{"key":"e_1_3_3_1_66_2","doi-asserted-by":"publisher","DOI":"10.1145\/2675133.2675175"},{"key":"e_1_3_3_1_67_2","unstructured":"Tianshi Li. 2026. Agentic LLMs as Powerful Deanonymizers: Re-identification of Participants in the Anthropic Interviewer Dataset. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2601.05918 (2026)."},{"key":"e_1_3_3_1_68_2","volume-title":"Neurips Safe Generative AI Workshop 2024","author":"Li Xuan","year":"2024","unstructured":"Xuan Li, Zhanke Zhou, Jianing Zhu, Jiangchao Yao, Tongliang Liu, and Bo Han. 2024. DeepInception: Hypnotize Large Language Model to Be Jailbreaker. In Neurips Safe Generative AI Workshop 2024. https:\/\/openreview.net\/forum?id=bYa0BhKR4q"},{"key":"e_1_3_3_1_69_2","doi-asserted-by":"publisher","DOI":"10.1145\/2971648.2971693"},{"key":"e_1_3_3_1_70_2","first-page":"465","volume-title":"23rd USENIX security symposium (USENIX security 14)","author":"Li Zhiwei","year":"2014","unstructured":"Zhiwei Li, Warren He, Devdatta Akhawe, and Dawn Song. 2014. The { Emperor\u2019s} new password manager: Security analysis of web-based password managers. In 23rd USENIX security symposium (USENIX security 14). 465\u2013479."},{"key":"e_1_3_3_1_71_2","doi-asserted-by":"publisher","unstructured":"Shaobo Liang and Ziyi Wei. 2024. Understanding Users\u2019 App-Switching Behavior During the Mobile Search: An Empirical Study from the Perspective of Push\u2013Pull\u2013Mooring Framework. Behavioral Sciences 14 11 (2024) 989. 10.3390\/bs14110989","DOI":"10.3390\/bs14110989"},{"key":"e_1_3_3_1_72_2","series-title":"(UPSEC\u201908)","volume-title":"Proceedings of the 1st Conference on Usability, Psychology, and Security","author":"Lipford Heather\u00a0Richter","year":"2008","unstructured":"Heather\u00a0Richter Lipford, Andrew Besmer, and Jason Watson. 2008. Understanding privacy settings in facebook with an audience view. In Proceedings of the 1st Conference on Usability, Psychology, and Security (San Francisco, California) (UPSEC\u201908). USENIX Association, USA, Article 2, 8\u00a0pages."},{"key":"e_1_3_3_1_73_2","volume-title":"Proceedings of the 28th USENIX Security Symposium","author":"Liu Florian","year":"2019","unstructured":"Florian Liu, Florian Kerschbaum, Peter Horn, and Dirk Lindemann. 2019. Polisis: Automated analysis and presentation of privacy policies using machine learning. In Proceedings of the 28th USENIX Security Symposium. USENIX Association."},{"key":"e_1_3_3_1_74_2","unstructured":"Yi Liu Gelei Deng Yuekang Li Kailong Wang Zihao Wang Xiaofeng Wang Tianwei Zhang Yepang Liu Haoyu Wang Yan Zheng et\u00a0al. 2023. Prompt injection attack against llm-integrated applications. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2306.05499 (2023)."},{"key":"e_1_3_3_1_75_2","first-page":"1669","volume-title":"34th USENIX Security Symposium (USENIX Security 25)","author":"Liu Yupei","year":"2025","unstructured":"Yupei Liu, Yuqi Jia, Jinyuan Jia, and Neil\u00a0Zhenqiang Gong. 2025. Evaluating { LLM-based} Personal Information Extraction and Countermeasures. In 34th USENIX Security Symposium (USENIX Security 25). 1669\u20131688."},{"key":"e_1_3_3_1_76_2","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.387"},{"key":"e_1_3_3_1_77_2","doi-asserted-by":"publisher","DOI":"10.1145\/3706598.3713540"},{"key":"e_1_3_3_1_78_2","unstructured":"Lucas Maystre and Matthias Grossglauser. 2015. Fast and accurate inference of Plackett\u2013Luce models. Advances in neural information processing systems 28 (2015)."},{"key":"e_1_3_3_1_79_2","doi-asserted-by":"publisher","unstructured":"Nora McDonald Sarita Schoenebeck and Andrea Forte. 2019. Reliability and inter-rater reliability in qualitative research: Norms and guidelines for CSCW and HCI practice. Proceedings of the ACM on human-computer interaction 3 CSCW (2019) 1\u201323. 10.1145\/3359174","DOI":"10.1145\/3359174"},{"key":"e_1_3_3_1_80_2","doi-asserted-by":"publisher","DOI":"10.1145\/3733816.3760760"},{"key":"e_1_3_3_1_81_2","unstructured":"Microsoft. 2025. AutoGen: A Framework for Building AI Agents and Applications. https:\/\/microsoft.github.io\/autogen\/stable\/index.html. Accessed: 2025-12-01."},{"key":"e_1_3_3_1_82_2","doi-asserted-by":"publisher","DOI":"10.1145\/3672539.3686778"},{"key":"e_1_3_3_1_83_2","doi-asserted-by":"publisher","DOI":"10.1145\/3746059.3747633"},{"key":"e_1_3_3_1_84_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP61157.2025.00087"},{"key":"e_1_3_3_1_85_2","unstructured":"Md\u00a0Mahadi\u00a0Hasan Nahid and Sadid\u00a0Bin Hasan. 2024. Safesynthdp: Leveraging large language models for privacy-preserving synthetic data generation using differential privacy. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2412.20641 (2024)."},{"key":"e_1_3_3_1_86_2","doi-asserted-by":"publisher","DOI":"10.1145\/3340531.3417469"},{"key":"e_1_3_3_1_87_2","doi-asserted-by":"publisher","unstructured":"Patricia\u00a0A Norberg Daniel\u00a0R Horne and David\u00a0A Horne. 2007. The privacy paradox: Personal information disclosure intentions versus behaviors. Journal of Consumer Affairs 41 1 (2007) 100\u2013126. 10.1111\/j.1745-6606.2006.00070.x","DOI":"10.1111\/j.1745-6606.2006.00070.x"},{"key":"e_1_3_3_1_88_2","doi-asserted-by":"publisher","unstructured":"Midas Nouwens Ilaria Liccardi Michael Veale David Karger and Lalana Kagal. 2020. Dark Patterns after the GDPR: Scraping Consent Pop-ups and Demonstrating their Influence. (2020) 1\u201313. 10.1145\/3313831.3376321","DOI":"10.1145\/3313831.3376321"},{"key":"e_1_3_3_1_89_2","unstructured":"OpenAI. 2025. Introducing GPT-5. OpenAI Blog. https:\/\/openai.com\/index\/introducing-gpt-5\/ Accessed: 2025-12-04."},{"key":"e_1_3_3_1_90_2","unstructured":"OpenAI. 2025. Introducing Operator. https:\/\/openai.com\/index\/introducing-operator\/."},{"key":"e_1_3_3_1_91_2","volume-title":"The Thirteenth International Conference on Learning Representations","author":"Panda Ashwinee","year":"2025","unstructured":"Ashwinee Panda, Xinyu Tang, Christopher\u00a0A. Choquette-Choo, Milad Nasr, and Prateek Mittal. 2025. Privacy Auditing of Large Language Models. In The Thirteenth International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=60Vd7QOXlM"},{"key":"e_1_3_3_1_92_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37437-1_4"},{"key":"e_1_3_3_1_93_2","doi-asserted-by":"publisher","unstructured":"Raja Parasuraman Thomas\u00a0B Sheridan and Christopher\u00a0D Wickens. 2000. A model for types and levels of human interaction with automation. IEEE Transactions on systems man and cybernetics-Part A: Systems and Humans 30 3 (2000) 286\u2013297. 10.1109\/3468.844354","DOI":"10.1109\/3468.844354"},{"key":"e_1_3_3_1_94_2","doi-asserted-by":"publisher","unstructured":"Eyal Peer and Alessandro Acquisti. 2016. The Impact of Reversibility on the Decision to Disclose Personal Information. Journal of Consumer Marketing 33 6 (Sept. 2016) 428\u2013436. 10.1108\/JCM-07-2015-1487","DOI":"10.1108\/JCM-07-2015-1487"},{"key":"e_1_3_3_1_95_2","unstructured":"Pew Research Center. 2024. Mobile Fact Sheet. Pew Research Center. https:\/\/www.pewresearch.org\/internet\/fact-sheet\/mobile\/ Based on survey of 5 626 U.S. adults conducted Feb. 1\u2013June 10 2024. Accessed: 2024-12-02."},{"key":"e_1_3_3_1_96_2","volume-title":"When AI Has Root: Lessons from the Supabase MCP Data Leak","year":"2025","unstructured":"Pomerium. 2025. When AI Has Root: Lessons from the Supabase MCP Data Leak. https:\/\/www.pomerium.com\/blog\/when-ai-has-root-lessons-from-the-supabase-mcp-data-leak"},{"key":"e_1_3_3_1_97_2","doi-asserted-by":"publisher","DOI":"10.1145\/3706598.3713320"},{"key":"e_1_3_3_1_98_2","doi-asserted-by":"publisher","unstructured":"Sunil\u00a0J Rao. 2003. Regression Modeling Strategies: With Applications to Linear Models Logistic Regression and Survival Analysis. J. Amer. Statist. Assoc. 98 461 (2003) 257\u2013258. arXiv:https:\/\/doi.org\/10.1198\/jasa.2003.s26310.1198\/jasa.2003.s263","DOI":"10.1198\/jasa.2003.s263"},{"key":"e_1_3_3_1_99_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.24"},{"key":"e_1_3_3_1_100_2","doi-asserted-by":"publisher","unstructured":"Giuseppe Romeo and Daniela Conti. 2025. Exploring automation bias in human\u2013AI collaboration: a review and implications for explainable AI. AI & SOCIETY (2025) 1\u201320. 10.1007\/s00146-025-02422-7","DOI":"10.1007\/s00146-025-02422-7"},{"key":"e_1_3_3_1_101_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC57700.2023.00282"},{"key":"e_1_3_3_1_102_2","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173626"},{"key":"e_1_3_3_1_103_2","doi-asserted-by":"publisher","unstructured":"Florian Schaub Rebecca Balebako and Lorrie\u00a0Faith Cranor. 2017. Designing effective privacy notices and controls. IEEE Internet Computing 21 3 (2017) 70\u201377. 10.1109\/MIC.2017.75","DOI":"10.1109\/MIC.2017.75"},{"key":"e_1_3_3_1_104_2","first-page":"1","volume-title":"Eleventh Symposium On Usable Privacy and Security (SOUPS 2015)","author":"Schaub Florian","year":"2015","unstructured":"Florian Schaub, Rebecca Balebako, Adam\u00a0L. Durity, and Lorrie\u00a0Faith Cranor. 2015. A Design Space for Effective Privacy Notices. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015). USENIX Association, Ottawa, 1\u201317. https:\/\/www.usenix.org\/conference\/soups2015\/proceedings\/presentation\/schaub"},{"key":"e_1_3_3_1_105_2","doi-asserted-by":"crossref","unstructured":"Timo Schick Jane Dwivedi-Yu Roberto Dess\u00ec Roberta Raileanu Maria Lomeli Eric Hambro Luke Zettlemoyer Nicola Cancedda and Thomas Scialom. 2023. Toolformer: Language models can teach themselves to use tools. Advances in Neural Information Processing Systems 36 (2023) 68539\u201368551.","DOI":"10.52202\/075280-2997"},{"key":"e_1_3_3_1_106_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445293"},{"key":"e_1_3_3_1_107_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376264"},{"key":"e_1_3_3_1_108_2","doi-asserted-by":"publisher","DOI":"10.52202\/079017-2837"},{"key":"e_1_3_3_1_109_2","unstructured":"Yonadav Shavit Sandhini Agarwal Miles Brundage Steven Adler Cullen O\u2019Keefe Rosie Campbell Teddy Lee Pamela Mishkin Tyna Eloundou Alan Hickey et\u00a0al. 2023. Practices for governing agentic AI systems. Research Paper OpenAI (2023)."},{"key":"e_1_3_3_1_110_2","doi-asserted-by":"publisher","unstructured":"Reza Shokri. 2015. Privacy Games: Optimal User-Centric Data Obfuscation. Proceedings on Privacy Enhancing Technologies 2015 2 (2015) 299\u2013315. 10.1515\/popets-2015-0024","DOI":"10.1515\/popets-2015-0024"},{"key":"e_1_3_3_1_111_2","first-page":"449","volume-title":"23rd USENIX Security Symposium (USENIX Security 14)","author":"Silver David","year":"2014","unstructured":"David Silver, Suman Jana, Dan Boneh, Eric Chen, and Collin Jackson. 2014. Password managers: Attacks and defenses. In 23rd USENIX Security Symposium (USENIX Security 14). 449\u2013464."},{"key":"e_1_3_3_1_112_2","doi-asserted-by":"publisher","unstructured":"Daniel Smullen Yuanyuan Feng Shikun\u00a0Aerin Zhang and Norman Sadeh. 2020. The best of both worlds: Mitigating trade-offs between accuracy and user burden in capturing mobile app privacy preferences. Proceedings on Privacy Enhancing Technologies (2020). 10.2478\/popets-2020-0011","DOI":"10.2478\/popets-2020-0011"},{"key":"e_1_3_3_1_113_2","volume-title":"The Twelfth International Conference on Learning Representations","author":"Staab Robin","year":"2024","unstructured":"Robin Staab, Mark Vero, Mislav Balunovic, and Martin Vechev. 2024. Beyond Memorization: Violating Privacy via Inference with Large Language Models. In The Twelfth International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=kmn0BhQk7p"},{"key":"e_1_3_3_1_114_2","volume-title":"The Thirteenth International Conference on Learning Representations","author":"Sun Bolun","year":"2025","unstructured":"Bolun Sun, Yifan Zhou, and Haiyun Jiang. 2025. Empowering Users in Digital Privacy Management through Interactive LLM-Based Agents. In The Thirteenth International Conference on Learning Representations. https:\/\/openreview.net\/forum?id=FEpAUnS7f7"},{"key":"e_1_3_3_1_115_2","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078833"},{"key":"e_1_3_3_1_116_2","doi-asserted-by":"publisher","unstructured":"S\u00a0Shyam Sundar. 2020. Rise of machine agency: A framework for studying the psychology of human\u2013AI interaction (HAII). Journal of computer-mediated communication 25 1 (2020) 74\u201388. 10.1093\/jcmc\/zmz026","DOI":"10.1093\/jcmc\/zmz026"},{"key":"e_1_3_3_1_117_2","unstructured":"Annie Surla. 2025. An Easy Introduction to LLM Reasoning AI Agents and Test Time Scaling. https:\/\/developer.nvidia.com\/blog\/an-easy-introduction-to-llm-reasoning-ai-agents-and-test-time-scaling\/. Accessed: 2025-06-05."},{"key":"e_1_3_3_1_118_2","unstructured":"Chenhao Tang Zhengliang Liu Chong Ma Zihao Wu Yiwei Li Wei Liu Dajiang Zhu Quanzheng Li Xiang Li Tianming Liu et\u00a0al. 2023. PolicyGPT: Automated analysis of privacy policies with large language models. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2309.10238 (2023)."},{"key":"e_1_3_3_1_119_2","unstructured":"Gemini Team Rohan Anil Sebastian Borgeaud Jean-Baptiste Alayrac Jiahui Yu Radu Soricut Johan Schalkwyk Andrew\u00a0M Dai Anja Hauth Katie Millican et\u00a0al. 2023. Gemini: a family of highly capable multimodal models. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2312.11805 (2023)."},{"key":"e_1_3_3_1_120_2","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354212"},{"key":"e_1_3_3_1_121_2","doi-asserted-by":"publisher","unstructured":"Iris van Ooijen Claire\u00a0M. Segijn and Suzanna\u00a0J. Opree. 2024. Privacy Cynicism and its Role in Privacy Decision-Making. Communication Research 51 2 (2024) 146\u2013177. 10.1177\/00936502211060984","DOI":"10.1177\/00936502211060984"},{"key":"e_1_3_3_1_122_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2025.acl-long.1227"},{"key":"e_1_3_3_1_123_2","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557413"},{"key":"e_1_3_3_1_124_2","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078841"},{"key":"e_1_3_3_1_125_2","doi-asserted-by":"publisher","unstructured":"Maximiliane Windl Alexander Hiesinger Robin Welsch Albrecht Schmidt and Sebastian\u00a0S Feger. 2022. SaferHome: interactive physical and digital smart home dashboards for communicating privacy assessments to owners and bystanders. Proceedings of the ACM on Human-Computer Interaction 6 ISS (2022) 680\u2013699. 10.1145\/3567739","DOI":"10.1145\/3567739"},{"key":"e_1_3_3_1_126_2","volume-title":"First Conference on Language Modeling","author":"Wu Qingyun","year":"2024","unstructured":"Qingyun Wu, Gagan Bansal, Jieyu Zhang, Yiran Wu, Beibin Li, Erkang Zhu, Li Jiang, Xiaoyun Zhang, Shaokun Zhang, Jiale Liu, Ahmed\u00a0Hassan Awadallah, Ryen\u00a0W White, Doug Burger, and Chi Wang. 2024. AutoGen: Enabling Next-Gen LLM Applications via Multi-Agent Conversations. In First Conference on Language Modeling. https:\/\/openreview.net\/forum?id=BAakY1hNKS"},{"key":"e_1_3_3_1_127_2","unstructured":"Zhiyu Wu Xiaokang Chen Zizheng Pan Xingchao Liu Wen Liu Damai Dai Huazuo Gao Yiyang Ma Chengyue Wu Bingxuan Wang et\u00a0al. 2024. Deepseek-vl2: Mixture-of-experts vision-language models for advanced multimodal understanding. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2412.10302 (2024)."},{"key":"e_1_3_3_1_128_2","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/2025.acl-long.1404"},{"key":"e_1_3_3_1_129_2","volume-title":"International Conference on Learning Representations (ICLR)","author":"Yao Shunyu","year":"2023","unstructured":"Shunyu Yao, Jeffrey Zhao, Dian Yu, Nan Du, Izhak Shafran, Karthik Narasimhan, and Yuan Cao. 2023. React: Synergizing reasoning and acting in language models. In International Conference on Learning Representations (ICLR)."},{"key":"e_1_3_3_1_130_2","series-title":"(SEC \u201925)","volume-title":"Proceedings of the 34th USENIX Conference on Security Symposium","author":"Zhan Xiao","year":"2025","unstructured":"Xiao Zhan, Juan\u00a0Carlos Carrillo, William Seymour, and Jose Such. 2025. Malicious LLM-based conversational AI makes users reveal personal information. In Proceedings of the 34th USENIX Conference on Security Symposium (Seattle, WA, USA) (SEC \u201925). USENIX Association, USA, Article 4, 20\u00a0pages."},{"key":"e_1_3_3_1_131_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642713"},{"key":"e_1_3_3_1_132_2","doi-asserted-by":"publisher","unstructured":"Shikun Zhang Yuanyuan Feng Yaxing Yao Lorrie\u00a0Faith Cranor and Norman Sadeh. 2022. How usable are ios app privacy labels?Proceedings on Privacy Enhancing Technologies (2022). 10.56553\/popets-2022-0106","DOI":"10.56553\/popets-2022-0106"},{"key":"e_1_3_3_1_133_2","first-page":"139","volume-title":"Twentieth Symposium on Usable Privacy and Security (SOUPS 2024)","author":"Zhang Shikun","year":"2024","unstructured":"Shikun Zhang, Lily Klucinec, Kyerra Norton, Norman Sadeh, and Lorrie\u00a0Faith Cranor. 2024. Exploring Expandable-Grid Designs to Make iOS App Privacy Labels More Usable. In Twentieth Symposium on Usable Privacy and Security (SOUPS 2024). USENIX Association, Philadelphia, PA, 139\u2013157. https:\/\/www.usenix.org\/conference\/soups2024\/presentation\/zhang"},{"key":"e_1_3_3_1_134_2","doi-asserted-by":"publisher","DOI":"10.1145\/3733816.3760752"},{"key":"e_1_3_3_1_135_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642385"},{"key":"e_1_3_3_1_136_2","doi-asserted-by":"publisher","unstructured":"Zhiping Zhang Chenxinran Shen Bingsheng Yao Dakuo Wang and Tianshi Li. 2025. Secret use of large language model (LLM). Proceedings of the ACM on Human-Computer Interaction 9 2 (2025) 1\u201326. 10.1145\/3711061","DOI":"10.1145\/3711061"},{"key":"e_1_3_3_1_137_2","doi-asserted-by":"publisher","DOI":"10.1145\/3706598.3713701"}],"event":{"name":"CHI 2026: CHI Conference on Human Factors in Computing Systems","location":"Barcelona Spain","acronym":"CHI '26","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2026 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3772318.3790671","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3772318.3790671","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T09:43:43Z","timestamp":1776419023000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3772318.3790671"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4,13]]},"references-count":136,"alternative-id":["10.1145\/3772318.3790671","10.1145\/3772318"],"URL":"https:\/\/doi.org\/10.1145\/3772318.3790671","relation":{},"subject":[],"published":{"date-parts":[[2026,4,13]]},"assertion":[{"value":"2026-04-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}