{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T04:44:38Z","timestamp":1776055478714,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2026,4,13]]},"DOI":"10.1145\/3772363.3798850","type":"proceedings-article","created":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T01:55:28Z","timestamp":1776045328000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Disclose with Care: AI Scaffolds for Privacy in Chatbot Interviews"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-9813-3497","authenticated-orcid":false,"given":"Ziwen","family":"Li","sequence":"first","affiliation":[{"name":"Northeastern University, Boston, Massachusetts, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3368-0180","authenticated-orcid":false,"given":"Ziang","family":"Xiao","sequence":"additional","affiliation":[{"name":"Johns Hopkins University, Baltimore, Maryland, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0877-5727","authenticated-orcid":false,"given":"Tianshi","family":"Li","sequence":"additional","affiliation":[{"name":"Northeastern University, Boston, Massachusetts, USA"}]}],"member":"320","published-online":{"date-parts":[[2026,4,13]]},"reference":[{"key":"e_1_3_3_2_2_2","doi-asserted-by":"crossref","unstructured":"Alessandro Acquisti Laura Brandimarte and George Loewenstein. 2015. Privacy and human behavior in the age of information. Science 347 6221 (2015) 509\u2013514.","DOI":"10.1126\/science.aaa1465"},{"key":"e_1_3_3_2_3_2","doi-asserted-by":"crossref","unstructured":"Theo Araujo Jef Ausloos Wouter van Atteveldt Felicia Loecherbach Judith Moeller Jakob Ohme Damian Trilling Bob van\u00a0de Velde Claes De\u00a0Vreese and Kasper Welbers. 2022. OSD2F: An open-source data donation framework. Computational Communication Research 4 2 (2022) 372\u2013387.","DOI":"10.5117\/CCR2022.2.001.ARAU"},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"crossref","unstructured":"Elettra Bietti. 2019. Consent as a free pass: Platform power and the limits of the informational turn. Pace L. Rev. 40 (2019) 310.","DOI":"10.58948\/2331-3528.2013"},{"key":"e_1_3_3_2_5_2","unstructured":"Jos\u00e9\u00a0Patr\u00edcio Bispo\u00a0J\u00fanior. 2022. Social desirability bias in qualitative health research. Revista de saude publica 56 (2022) 101."},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"crossref","unstructured":"Andrea Caputo. 2017. Social desirability bias in self-reported well-being measures: Evidence from an online survey. Universitas Psychologica 16 2 (2017) 245\u2013255.","DOI":"10.11144\/Javeriana.upsy16-2.sdsw"},{"key":"e_1_3_3_2_7_2","first-page":"2633","volume-title":"30th USENIX security symposium (USENIX Security 21)","author":"Carlini Nicholas","year":"2021","unstructured":"Nicholas Carlini, Florian Tramer, Eric Wallace, Matthew Jagielski, Ariel Herbert-Voss, Katherine Lee, Adam Roberts, Tom Brown, Dawn Song, Ulfar Erlingsson, et\u00a0al. 2021. Extracting training data from large language models. In 30th USENIX security symposium (USENIX Security 21). 2633\u20132650."},{"key":"e_1_3_3_2_8_2","unstructured":"Justine Cassell. 2001. Embodied conversational agents: representation and intelligence in user interfaces. AI magazine 22 4 (2001) 67\u201367."},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"crossref","unstructured":"Kathleen\u00a0Kara Fitzpatrick Alison Darcy and Molly Vierhile. 2017. Delivering cognitive behavior therapy to young adults with symptoms of depression and anxiety using a fully automated conversational agent (Woebot): a randomized controlled trial. JMIR mental health 4 2 (2017) e7785.","DOI":"10.2196\/mental.7785"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"crossref","unstructured":"Blandine French Camilla Babbage Katherine Bird Lauren Marsh Mirabel Pelton Shireen Patel Sarah Cassidy and Stefan Rennick-Egglestone. 2024. Data integrity issues with web-based studies: an institutional example of a widespread challenge. JMIR Mental Health 11 1 (2024) e58432.","DOI":"10.2196\/58432"},{"key":"e_1_3_3_2_11_2","first-page":"85","volume-title":"Proceedings of the 2014 international conference on Autonomous agents and multi-agent systems","author":"Gratch Jonathan","year":"2014","unstructured":"Jonathan Gratch, Gale\u00a0M Lucas, Aisha\u00a0Aisha King, and Louis-Philippe Morency. 2014. It\u2019s only a computer: the impact of human-agent interaction in clinical interviews. In Proceedings of the 2014 international conference on Autonomous agents and multi-agent systems. 85\u201392."},{"key":"e_1_3_3_2_12_2","unstructured":"Thomas Gro\u00df. 2020. Validity and Reliability of the Scale Internet Users\u2019 Information Privacy Concern (IUIPC)[Extended Version]. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2011.11749 (2020)."},{"key":"e_1_3_3_2_13_2","unstructured":"K. Handa M. Stern S. Huang J. Hong E. Durmus M. McCain G. Yun A. Alt T. Millar A. Tamkin J. Leibrock S. Ritchie and D. Ganguli. 2025. Introducing Anthropic Interviewer: What 1 250 Professionals Told Us About Working with AI. https:\/\/www.anthropic.com\/research\/anthropic-interviewer. Archived at https:\/\/web.archive.org\/web\/20251204184855\/https:\/\/www.anthropic.com\/research\/anthropic-interviewer."},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"crossref","unstructured":"David\u00a0A Herz Janice\u00a0E Looman and Shirley\u00a0Kane Lewis. 1992. Informed consent: is it a myth? Neurosurgery 30 3 (1992) 453\u2013458.","DOI":"10.1097\/00006123-199203000-00028"},{"key":"e_1_3_3_2_15_2","first-page":"39","volume-title":"Eleventh symposium on usable privacy and security (SOUPS 2015)","author":"Kang Ruogu","year":"2015","unstructured":"Ruogu Kang, Laura Dabbish, Nathaniel Fruchter, and Sara Kiesler. 2015. { \u201cMy} data just goes { Everywhere:\u201d} user mental models of the internet and implications for privacy and security. In Eleventh symposium on usable privacy and security (SOUPS 2015). 39\u201352."},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"crossref","unstructured":"Jane Kaye Edgar\u00a0A Whitley David Lund Michael Morrison Harriet Teare and Karen Melham. 2015. Dynamic consent: a patient interface for twenty-first century research networks. European journal of human genetics 23 2 (2015) 141\u2013146.","DOI":"10.1038\/ejhg.2014.71"},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"crossref","unstructured":"Carl\u00a0A Latkin Catie Edwards Melissa\u00a0A Davey-Rothwell and Karin\u00a0E Tobin. 2017. The relationship between social desirability bias and self-reports of health substance use and social network factors among urban substance users in Baltimore Maryland. Addictive behaviors 73 (2017) 133\u2013136.","DOI":"10.1016\/j.addbeh.2017.05.005"},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376175"},{"key":"e_1_3_3_2_19_2","unstructured":"Tianshi Li. 2026. Agentic LLMs as Powerful Deanonymizers: Re-identification of Participants in the Anthropic Interviewer Dataset. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2601.05918 (2026)."},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"crossref","unstructured":"Laura\u00a0H Lind Michael\u00a0F Schober Frederick\u00a0G Conrad and Heidi Reichert. 2013. Why do survey respondents disclose more when computers ask the questions? Public opinion quarterly 77 4 (2013) 888\u2013935.","DOI":"10.1093\/poq\/nft038"},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"crossref","unstructured":"Gale\u00a0M Lucas Jonathan Gratch Aisha King and Louis-Philippe Morency. 2014. It\u2019s only a computer: Virtual humans increase willingness to disclose. Computers in Human Behavior 37 (2014) 94\u2013100.","DOI":"10.1016\/j.chb.2014.04.043"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858288"},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"publisher","unstructured":"Sara Memarian Onkar\u00a0S. Malgonde and Dan\u00a0J. Kim. 2025. Unraveling the Privacy Paradox: a Comprehensive Review of Factors Behind the Discrepancy in Online Concerns and Disclosure Behavior. Information Systems Frontiers (2025). 10.1007\/s10796-025-10617-yAccepted: 27 May 2025.","DOI":"10.1007\/s10796-025-10617-y"},{"key":"e_1_3_3_2_24_2","unstructured":"Microsoft. 2025. Presidio: Data protection and de-identification SDK. https:\/\/microsoft.github.io\/presidio\/."},{"key":"e_1_3_3_2_25_2","unstructured":"Niloofar Mireshghallah Maria Antoniak Yash More Yejin Choi and Golnoosh Farnadi. 2024. Trust no bot: Discovering personal disclosures in human-llm conversations in the wild. arXiv preprint arXiv:https:\/\/arXiv.org\/abs\/2407.11438 (2024)."},{"key":"e_1_3_3_2_26_2","doi-asserted-by":"crossref","unstructured":"Emma Nicol Jo Briggs Wendy Moncur Amal Htait Daniel\u00a0Paul Carey Leif Azzopardi and Burkhard Schafer. 2022. Revealing cumulative risks in online personal information: a data narrative study. Proceedings of the ACM on Human-Computer Interaction 6 CSCW2 (2022) 1\u201325.","DOI":"10.1145\/3555214"},{"key":"e_1_3_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613905.3636309"},{"key":"e_1_3_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642732"},{"key":"e_1_3_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-590241-0.50006-X"},{"key":"e_1_3_3_2_30_2","doi-asserted-by":"publisher","unstructured":"Matthew\u00a0D. Pickard Catherine\u00a0A. Roster and Yixing Chen. 2016. Revealing sensitive information in personal interviews: Is self-disclosure easier with humans or avatars and under what conditions? Computers in Human Behavior 65 (2016) 23\u201330. 10.1016\/j.chb.2016.08.004","DOI":"10.1016\/j.chb.2016.08.004"},{"key":"e_1_3_3_2_31_2","first-page":"1","volume-title":"Eleventh symposium on usable privacy and security (SOUPS 2015)","author":"Schaub Florian","year":"2015","unstructured":"Florian Schaub, Rebecca Balebako, Adam\u00a0L Durity, and Lorrie\u00a0Faith Cranor. 2015. A design space for effective privacy notices. In Eleventh symposium on usable privacy and security (SOUPS 2015). 1\u201317."},{"key":"e_1_3_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/3588967.3588971"},{"key":"e_1_3_3_2_33_2","unstructured":"Daniel\u00a0J Solove. 2013. Introduction: Privacy self-management and the consent dilemma. Harvard law review 126 7 (2013) 1880\u20131903."},{"key":"e_1_3_3_2_34_2","doi-asserted-by":"crossref","unstructured":"BM Stanley DJ Walters and GJ Maddern. 1998. Informed consent: how much information is enough? Australian and New Zealand journal of surgery 68 11 (1998) 788\u2013791.","DOI":"10.1111\/j.1445-2197.1998.tb04678.x"},{"key":"e_1_3_3_2_35_2","doi-asserted-by":"crossref","unstructured":"Roger Tourangeau and Ting Yan. 2007. Sensitive questions in surveys. Psychological bulletin 133 5 (2007) 859.","DOI":"10.1037\/0033-2909.133.5.859"},{"key":"e_1_3_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581252"},{"key":"e_1_3_3_2_37_2","doi-asserted-by":"crossref","unstructured":"Ziang Xiao Michelle\u00a0X Zhou Q\u00a0Vera Liao Gloria Mark Changyan Chi Wenxi Chen and Huahai Yang. 2020. Tell me about yourself: Using an AI-powered chatbot to conduct conversational surveys with open-ended questions. ACM Transactions on Computer-Human Interaction (TOCHI) 27 3 (2020) 1\u201337.","DOI":"10.1145\/3381804"},{"key":"e_1_3_3_2_38_2","first-page":"61","volume-title":"34th USENIX Security Symposium (USENIX Security 25)","author":"Zhan Xiao","year":"2025","unstructured":"Xiao Zhan, Juan\u00a0Carlos Carrillo, William Seymour, and Jose Such. 2025. Malicious { LLM-Based} Conversational { AI} Makes Users Reveal Personal Information. In 34th USENIX Security Symposium (USENIX Security 25). 61\u201380."},{"key":"e_1_3_3_2_39_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642385"}],"event":{"name":"CHI EA '26: Extended Abstracts of the 2026 CHI Conference on Human Factors in Computing Systems","location":"Barcelona , Spain","acronym":"CHI EA '26","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the Extended Abstracts of the 2026 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3772363.3798850","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T03:56:17Z","timestamp":1776052577000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3772363.3798850"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4,13]]},"references-count":38,"alternative-id":["10.1145\/3772363.3798850","10.1145\/3772363"],"URL":"https:\/\/doi.org\/10.1145\/3772363.3798850","relation":{},"subject":[],"published":{"date-parts":[[2026,4,13]]},"assertion":[{"value":"2026-04-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}